We had a great time at Black Hat and DEF CON 2025.
Thanks to everyone who spent time with the ELLIO team. We always value sharing knowledge, exchanging insights, and gaining new perspectives on the challenges we face together every day.
No chance to meet us in Vegas? Let's connect now!
This year belonged to network fingerprints.
New open-source TCP Fingerprint Firewall live on GitHub.
How do you stop scanners before they map your network? At Black Hat 2025, we launched TCP Fingerprint Firewall, built to block malicious and promiscuous scanners. Instead of relying on simple port or IP rules, it uses MuonFP-based fingerprints - subtle TCP header traits that reveal tools like Nmap, ZMap, and Masscan, along with operating system and device signatures. More at GitHub
Deep-dive into modern network fingerprinting.
At DEF CON 2025, the ELLIO team ran a live lab on TCP and TLS fingerprinting. Participants learned how to capture packets, use tools like MuonFP, p0f, JA3/JA3n, and JA4, and turn fingerprints into firewall rules to block threats in real time. Want to see network fingerprinting in action? Check out the ELLIO IP Threat Platform and see how modern fingerprints work for you.