→ https://www.ma2e.top:4443 ← tls检测点这里
自己写了一个tls的解析,试着检测了一下,tls_check为True则通过了检测。
如果正常浏览器过不了请在下方留言,我这里样本太少辣
【感谢 星期五 哥帮我找出了一个bug!!!!!!!】

解析示例:
{
"tls_check": true,
"ja3": "771,4865-4866-4867-49195-49199-49196-49200-52393-52392-49171-49172-156-157-47-53,23-5-65281-16-43-11-17513-51-45-10-65037-27-18-13-35-56026,29-23-24,0",
"ja3_hash": "50de6af7c13e2f9cea3d04f52daf8479",
"content_type": "HANDSHAKE",
"record_tls_version": "TLSv1.0",
"tls_length": 512,
"handshake_type": "CLIENT_HELLO",
"protocol_length": 508,
"tls_version": "TLSv1.2",
"random": "f5a54f46ce1192031793f4692bfbb9508316316eee9a69ff04c9c65d3c09df4f",
"session_length": 32,
"session_id": "75c712bbc9cda4ba2be64b7d20170f3942403aa71ca32e8f2e11a725d7c3aaf3",
"cipher_len": 32,
"cipher_suites": [
"GREASE (0x8a8a)",
"TLS_AES_128_GCM_SHA256 (0x1301)",
"TLS_AES_256_GCM_SHA384 (0x1302)",
"TLS_CHACHA20_POLY1305_SHA256 (0x1303)",
"ECDHE-ECDSA-AES128-GCM-SHA256 (0xc02b)",
"ECDHE-RSA-AES128-GCM-SHA256 (0xc02f)",
"ECDHE-ECDSA-AES256-GCM-SHA384 (0xc02c)",
"ECDHE-RSA-AES256-GCM-SHA384 (0xc030)",
"ECDHE-ECDSA-CHACHA20-POLY1305 (0xcca9)",
"ECDHE-RSA-CHACHA20-POLY1305 (0xcca8)",
"ECDHE-RSA-AES128-SHA (0xc013)",
"ECDHE-RSA-AES256-SHA (0xc014)",
"AES128-GCM-SHA256 (0x9c)",
"AES256-GCM-SHA384 (0x9d)",
"AES128-SHA (0x2f)",
"AES256-SHA (0x35)"
],
"compression_method": 1,
"padding": 0,
"extensions_length": 403,
"extensions": [
{
"name": "GREASE (0xcaca)",
"length": 0,
"data": ""
},
{
"name": "extended_master_secret (0x17)",
"length": 0,
"data": ""
},
{
"name": "status_request (0x5)",
"length": 5,
"data": "0100000000"
},
{
"name": "renegotiation_info (0xff01)",
"length": 1,
"data": "00"
},
{
"name": "application_layer_protocol_negotiation (0x10)",
"length": 14,
"data": "000c02683208687474702f312e31"
},
{
"name": "supported_versions (0x2b)",
"length": 11,
"data": "0a0a0a0304030303020301"
},
{
"name": "ec_point_formats (0xb)",
"length": 2,
"data": "0100"
},
{
"name": "application_settings_old (0x4469)",
"length": 5,
"data": "0003026832"
},
{
"name": "key_share (0x33)",
"length": 43,
"data": "00298a8a000100001d0020f55318c75330d4fd685ea958d7dd373f039b8458ea4ed6c4bf255c1bed2b4c69"
},
{
"name": "psk_key_exchange_modes (0x2d)",
"length": 2,
"data": "0101"
},
{
"name": "supported_groups (renamed from \"elliptic_curves\") (0xa)",
"length": 10,
"data": [
"GREASE (0x8a8a)",
"X25519 (0x1d)",
"secp256r1 (0x17)",
"secp384r1 (0x18)"
]
},
{
"name": "encrypted_client_hello (0xfe0d)",
"length": 186,
"data": "00000100011b0020213201a9e8ba26294615a734ec5a312c19e8d56d0f6b8760e985d76fe70ab14f0090fcbc2618ba0164cc58ce9362595b1796ad4a0ed903b41f595d5eb853fbef90fb7bd55b09419040c5edd9ffffb9f9b78eceb83c78c657563b98b36b307c42fa25f06f6fea90fc03c4d0a201ac97add9ef1624335ee09ba5565b534ce523ff1687c4649d01f86c77f40476c57435587232b84182e40df20614aaddb22c865e3b39e46285fa53d3b4183a1d8d854e07ccbd"
},
{
"name": "compress_certificate (0x1b)",
"length": 3,
"data": "020002"
},
{
"name": "signed_certificate_timestamp (0x12)",
"length": 0,
"data": ""
},
{
"name": "signature_algorithms (0xd)",
"length": 18,
"data": "001004030804040105030805050108060601"
},
{
"name": "session_ticket (renamed from \"SessionTicket TLS\") (0x23)",
"length": 0,
"data": ""
},
{
"name": "GREASE (0xdada)",
"length": 1,
"data": "00"
},
{
"name": "padding (0x15)",
"length": 30,
"data": "000000000000000000000000000000000000000000000000000000000000"
}
],
"curves": [
"GREASE (0x8a8a)",
"X25519 (0x1d)",
"secp256r1 (0x17)",
"secp384r1 (0x18)"
],
"browser_type": "chrome"
}

发表回复