This document discusses using SSL/TLS fingerprinting and the JA3 hash to detect malware and command and control (C2) communications within encrypted HTTPS tunnels. It describes setting up Suricata with SSL/TLS fingerprinting to baseline common browsers and analyze malware samples that use encryption for exfiltration and C2. The document also covers installing and configuring Suricata to perform this analysis on a test network.