aboutsummaryrefslogtreecommitdiff
path: root/src/lib
diff options
context:
space:
mode:
authorLuca <deri@ntop.org>2022-01-28 15:02:42 +0100
committerLuca <deri@ntop.org>2022-01-28 15:02:42 +0100
commit7a3aa41afc7cce3b5df2a41678f4c857fd86fb7d (patch)
treef4fbf7cf85c97577f39d8c843c0329ea7d86dd44 /src/lib
parentc53c82d4823b5a8f856d1375155ac5112b68e8af (diff)
Updated alert description case
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/ndpi_utils.c48
1 files changed, 24 insertions, 24 deletions
diff --git a/src/lib/ndpi_utils.c b/src/lib/ndpi_utils.c
index 9c18c0a4e..115ca49bf 100644
--- a/src/lib/ndpi_utils.c
+++ b/src/lib/ndpi_utils.c
@@ -1721,28 +1721,28 @@ const char* ndpi_risk2str(ndpi_risk_enum risk) {
switch(risk) {
case NDPI_URL_POSSIBLE_XSS:
- return("XSS attack");
+ return("XSS Attack");
case NDPI_URL_POSSIBLE_SQL_INJECTION:
- return("SQL injection");
+ return("SQL Injection");
case NDPI_URL_POSSIBLE_RCE_INJECTION:
- return("RCE injection");
+ return("RCE Injection");
case NDPI_BINARY_APPLICATION_TRANSFER:
- return("Binary application transfer");
+ return("Binary Application Transfer");
case NDPI_KNOWN_PROTOCOL_ON_NON_STANDARD_PORT:
- return("Known protocol on non standard port");
+ return("Known Protocol on Non Standard Port");
case NDPI_TLS_SELFSIGNED_CERTIFICATE:
return("Self-signed Certificate");
case NDPI_TLS_OBSOLETE_VERSION:
- return("Obsolete TLS version (older than 1.2)");
+ return("Obsolete TLS Version (1.1 or older)");
case NDPI_TLS_WEAK_CIPHER:
- return("Weak TLS cipher");
+ return("Weak TLS Cipher");
case NDPI_TLS_CERTIFICATE_EXPIRED:
return("TLS Expired Certificate");
@@ -1763,13 +1763,13 @@ const char* ndpi_risk2str(ndpi_risk_enum risk) {
return("HTTP Suspicious Header");
case NDPI_TLS_NOT_CARRYING_HTTPS:
- return("TLS (probably) not carrying HTTPS");
+ return("TLS (probably) Not Carrying HTTPS");
case NDPI_SUSPICIOUS_DGA_DOMAIN:
- return("Suspicious DGA domain name");
+ return("Suspicious DGA Domain name");
case NDPI_MALFORMED_PACKET:
- return("Malformed packet");
+ return("Malformed Packet");
case NDPI_SSH_OBSOLETE_CLIENT_VERSION_OR_CIPHER:
return("SSH Obsolete Client Version/Cipher");
@@ -1787,19 +1787,19 @@ const char* ndpi_risk2str(ndpi_risk_enum risk) {
return("Unsafe Protocol");
case NDPI_DNS_SUSPICIOUS_TRAFFIC:
- return("Suspicious DNS traffic"); /* Exfiltration ? */
+ return("Suspicious DNS Traffic"); /* Exfiltration ? */
case NDPI_TLS_MISSING_SNI:
- return("SNI TLS extension was missing");
+ return("Missing SNI TLS Extension");
case NDPI_HTTP_SUSPICIOUS_CONTENT:
- return("HTTP suspicious content");
+ return("HTTP Suspicious Content");
case NDPI_RISKY_ASN:
return("Risky ASN");
case NDPI_RISKY_DOMAIN:
- return("Risky domain name");
+ return("Risky Domain Name");
case NDPI_MALICIOUS_JA3:
return("Possibly Malicious JA3 Fingerprint");
@@ -1814,35 +1814,35 @@ const char* ndpi_risk2str(ndpi_risk_enum risk) {
return("Uncommon TLS ALPN");
case NDPI_TLS_CERT_VALIDITY_TOO_LONG:
- return("TLS certificate validity longer than 13 months");
+ return("TLS Certificate Validity Too Long");
case NDPI_TLS_SUSPICIOUS_EXTENSION:
- return("TLS suspicious extension");
+ return("TLS Suspicious Extension");
case NDPI_TLS_FATAL_ALERT:
- return("TLS fatal alert");
+ return("TLS Fatal Alert");
case NDPI_SUSPICIOUS_ENTROPY:
- return("Suspicious entropy");
+ return("Suspicious Entropy");
case NDPI_CLEAR_TEXT_CREDENTIALS:
- return("Clear-text credentials");
+ return("Clear-Text Credentials");
case NDPI_DNS_LARGE_PACKET:
- return("DNS packet larger than 512 bytes");
+ return("DNS Packet Larger Than 512 bytes");
case NDPI_DNS_FRAGMENTED:
- return("Fragmented DNS message");
+ return("Fragmented DNS Message");
case NDPI_INVALID_CHARACTERS:
- return("Text contains non-printable characters");
+ return("Text Contains Non-Printable Characters");
case NDPI_POSSIBLE_EXPLOIT:
- return("Possible exploit detected");
+ return("Possible Exploit Detected");
break;
case NDPI_TLS_CERTIFICATE_ABOUT_TO_EXPIRE:
- return("TLS certificate about to expire");
+ return("TLS Certificate About To Expire");
break;
default: