aboutsummaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
* fix segment fault cause by the ssl.server_names when it may NULLysk2020-06-03
|
* fix segment fault cause by the ssl.server_names when it may NULLysk2020-06-03
|
* Merge branch 'dev' of github.com:yskcg/nDPI into devysk2020-06-03
|\
| * nDpi#remove build warningsysk2020-05-21
| |
* | Merge branch 'dev' of github.com:yskcg/nDPI into devysk2020-05-20
|\ \ | |/ |/|
| * Added fix to avoid potential heap buffer overflow in H.323 dissectorLuca Deri2020-05-19
| | | | | | | | Modified HTTP report information to make it closer to the HTTP field names
* | someip#fix when run across architectures such ARM ,may be occour sigbus ↵ysk2020-05-20
|/ | | | error(),Unhandled fault: alignment fault (0x92000021) at 0x00000000f67004aa
* Added check for invalid HTTP URLsLuca Deri2020-05-16
|
* Added check for binary scriptsLuca Deri2020-05-15
| | | | | Added NDPI_HTTP_NUMERIC_IP_HOST risk ndpi_risk moved to 32 bit
* Fix for potential heap-buffer-overflow in ndpi_search_openvpnLuca Deri2020-05-15
|
* Added NDPI_HTTP_SUSPICIOUS_USER_AGENT ndpi_riskLuca Deri2020-05-15
|
* Merge branch 'dev' of https://github.com/ntop/nDPI into devLuca Deri2020-05-15
|\
| * Added link to nfstreamLuca Deri2020-05-15
| |
* | Added NDPI_TLS_CERTIFICATE_EXPIRED, NDPI_TLS_CERTIFICATE_MISMATCH, to ndpi_riskLuca Deri2020-05-15
|/
* Gotomeeting address range fixLuca Deri2020-05-15
|
* Improvements on GotoMeetingLuca Deri2020-05-15
| | | | Added pcap for testing malware
* Merge pull request #903 from Loures/devLuca Deri2020-05-14
|\ | | | | Extend packet struct with Content-Disposition HTTP header field
| * Extend filetype matching for Content-Disposition headerloures2020-05-14
| |
| * Extend packet struct with Content-Disposition HTTP header fieldloures2020-05-14
|/ | | | and improve HTTP binary transfer mime type check
* Code clenup for PR #902Luca Deri2020-05-14
|
* Merge pull request #902 from Loures/devLuca Deri2020-05-14
|\ | | | | Add check for HTTP transfer of executable files
| * Set risk field instead of changing protocol when checking for dangerousloures2020-05-13
| | | | | | | | HTTP traffic
| * Add check for HTTP transfer of executable filesloures2020-05-13
|/
* Code cleanupLuca Deri2020-05-13
|
* Merge pull request #897 from catenacyber/fuzzoracleLuca Deri2020-05-12
|\ | | | | Adds bound check in oracle protocol
| * Adds bound check in oracle protocolPhilippe Antoine2020-05-10
| | | | | | | | | | Found by oss-fuzz https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21780
* | Merge pull request #896 from IvanNardi/natsLuca Deri2020-05-12
|\ \ | | | | | | Fix NATS dissector
| * | Fix NATS dissectorNardi Ivan2020-05-09
| |/
* | Invalid TLS checkLuca Deri2020-05-12
| |
* | Added NDPI_XXX_BIT_16Luca Deri2020-05-11
| |
* | Added TLS weak cipher and obsolete protocol version detectionLuca Deri2020-05-10
| |
* | Added detection of self-signed TLS certificatesLuca Deri2020-05-10
| |
* | Added the ability to detect when a known protocol is using a non-standard portLuca Deri2020-05-10
|/ | | | Added check to spot executables exchanged via HTTP
* Cleaned hyperscan leftoverLuca Deri2020-05-08
| | | | Added further hyperscan hooks
* Added self signed certificate test pcapLuca Deri2020-05-08
|
* Added TLS issuerDN and subjectDNLuca Deri2020-05-07
|
* Reworked TLS dissector with a certificate RDN sequence readerLuca Deri2020-05-07
|
* Fixed category matchingLuca Deri2020-05-06
|
* API cleanup for indetifying explicitly in automa's what we're searching ↵Luca Deri2020-05-06
| | | | | | (protocol or category) Removed hyperscan support that is apperently unused
* Updated automa API to use 32 bit values splits from protocol/categpryLuca Deri2020-05-06
|
* Added support for Telegram v6Luca Deri2020-05-06
|
* Introduced custom protocols with IP and (optional) port supportLuca Deri2020-05-06
| | | | | | | | | | | | | | | | Example - Single IP address ip:213.75.170.11@CustomProtocol - IP address with CIDR ip:213.75.170.11/32@CustomProtocol - IP address with CIDR and port ip:213.75.170.11/32:443@CustomProtocol Please note that there are some restrictions on the port usage. They have been listed in example/protos.txt
* Various fixes to patricia tree handlingLuca Deri2020-05-06
|
* False positive fixesLuca Deri2020-05-06
|
* Updated APILuca Deri2020-05-06
|
* Reworked protocol handling chnging it is u_int16_tLuca Deri2020-05-06
|
* Removed now obsolete MSN protocolLuca Deri2020-05-03
| | | | Added nats.io protocol dissector
* SSH boundary check reworkLuca Deri2020-04-30
|
* Minor cleanupLuca Deri2020-04-30
|
* Merge pull request #891 from catenacyber/ghsl2Luca Deri2020-04-30
|\ | | | | Better fix for integer overflow in SSH