diff options
author | Luca <deri@ntop.org> | 2022-01-28 15:02:42 +0100 |
---|---|---|
committer | Luca <deri@ntop.org> | 2022-01-28 15:02:42 +0100 |
commit | 7a3aa41afc7cce3b5df2a41678f4c857fd86fb7d (patch) | |
tree | f4fbf7cf85c97577f39d8c843c0329ea7d86dd44 /src/lib | |
parent | c53c82d4823b5a8f856d1375155ac5112b68e8af (diff) |
Updated alert description case
Diffstat (limited to 'src/lib')
-rw-r--r-- | src/lib/ndpi_utils.c | 48 |
1 files changed, 24 insertions, 24 deletions
diff --git a/src/lib/ndpi_utils.c b/src/lib/ndpi_utils.c index 9c18c0a4e..115ca49bf 100644 --- a/src/lib/ndpi_utils.c +++ b/src/lib/ndpi_utils.c @@ -1721,28 +1721,28 @@ const char* ndpi_risk2str(ndpi_risk_enum risk) { switch(risk) { case NDPI_URL_POSSIBLE_XSS: - return("XSS attack"); + return("XSS Attack"); case NDPI_URL_POSSIBLE_SQL_INJECTION: - return("SQL injection"); + return("SQL Injection"); case NDPI_URL_POSSIBLE_RCE_INJECTION: - return("RCE injection"); + return("RCE Injection"); case NDPI_BINARY_APPLICATION_TRANSFER: - return("Binary application transfer"); + return("Binary Application Transfer"); case NDPI_KNOWN_PROTOCOL_ON_NON_STANDARD_PORT: - return("Known protocol on non standard port"); + return("Known Protocol on Non Standard Port"); case NDPI_TLS_SELFSIGNED_CERTIFICATE: return("Self-signed Certificate"); case NDPI_TLS_OBSOLETE_VERSION: - return("Obsolete TLS version (older than 1.2)"); + return("Obsolete TLS Version (1.1 or older)"); case NDPI_TLS_WEAK_CIPHER: - return("Weak TLS cipher"); + return("Weak TLS Cipher"); case NDPI_TLS_CERTIFICATE_EXPIRED: return("TLS Expired Certificate"); @@ -1763,13 +1763,13 @@ const char* ndpi_risk2str(ndpi_risk_enum risk) { return("HTTP Suspicious Header"); case NDPI_TLS_NOT_CARRYING_HTTPS: - return("TLS (probably) not carrying HTTPS"); + return("TLS (probably) Not Carrying HTTPS"); case NDPI_SUSPICIOUS_DGA_DOMAIN: - return("Suspicious DGA domain name"); + return("Suspicious DGA Domain name"); case NDPI_MALFORMED_PACKET: - return("Malformed packet"); + return("Malformed Packet"); case NDPI_SSH_OBSOLETE_CLIENT_VERSION_OR_CIPHER: return("SSH Obsolete Client Version/Cipher"); @@ -1787,19 +1787,19 @@ const char* ndpi_risk2str(ndpi_risk_enum risk) { return("Unsafe Protocol"); case NDPI_DNS_SUSPICIOUS_TRAFFIC: - return("Suspicious DNS traffic"); /* Exfiltration ? */ + return("Suspicious DNS Traffic"); /* Exfiltration ? */ case NDPI_TLS_MISSING_SNI: - return("SNI TLS extension was missing"); + return("Missing SNI TLS Extension"); case NDPI_HTTP_SUSPICIOUS_CONTENT: - return("HTTP suspicious content"); + return("HTTP Suspicious Content"); case NDPI_RISKY_ASN: return("Risky ASN"); case NDPI_RISKY_DOMAIN: - return("Risky domain name"); + return("Risky Domain Name"); case NDPI_MALICIOUS_JA3: return("Possibly Malicious JA3 Fingerprint"); @@ -1814,35 +1814,35 @@ const char* ndpi_risk2str(ndpi_risk_enum risk) { return("Uncommon TLS ALPN"); case NDPI_TLS_CERT_VALIDITY_TOO_LONG: - return("TLS certificate validity longer than 13 months"); + return("TLS Certificate Validity Too Long"); case NDPI_TLS_SUSPICIOUS_EXTENSION: - return("TLS suspicious extension"); + return("TLS Suspicious Extension"); case NDPI_TLS_FATAL_ALERT: - return("TLS fatal alert"); + return("TLS Fatal Alert"); case NDPI_SUSPICIOUS_ENTROPY: - return("Suspicious entropy"); + return("Suspicious Entropy"); case NDPI_CLEAR_TEXT_CREDENTIALS: - return("Clear-text credentials"); + return("Clear-Text Credentials"); case NDPI_DNS_LARGE_PACKET: - return("DNS packet larger than 512 bytes"); + return("DNS Packet Larger Than 512 bytes"); case NDPI_DNS_FRAGMENTED: - return("Fragmented DNS message"); + return("Fragmented DNS Message"); case NDPI_INVALID_CHARACTERS: - return("Text contains non-printable characters"); + return("Text Contains Non-Printable Characters"); case NDPI_POSSIBLE_EXPLOIT: - return("Possible exploit detected"); + return("Possible Exploit Detected"); break; case NDPI_TLS_CERTIFICATE_ABOUT_TO_EXPIRE: - return("TLS certificate about to expire"); + return("TLS Certificate About To Expire"); break; default: |