diff options
author | Toni Uhlig <matzeton@googlemail.com> | 2024-11-11 16:19:07 +0100 |
---|---|---|
committer | Toni Uhlig <matzeton@googlemail.com> | 2024-11-13 17:23:31 +0100 |
commit | 9efdecf4efa352a6046c88a945cf9ff8db1b37b9 (patch) | |
tree | 43c6ba4a106f47420a4f5dc1ddfe393400c5dbda /test/results/flow-captured/caches_cfg | |
parent | 8c114e49168eb38a8598b5b342c7144a07323320 (diff) |
bump libnDPI to 59ee1fe1156be234fed796972a29a31a0589e25a
* set minimum nDPI version to 4.12.0 (incompatible API changes)
* fixed `ndpi_debug_printf()` function signature
* JSON schema (flow): added risk `56`: "Obfuscated Traffic"
* JSON schema (flow): added "domainame"
* fixed OpenWrt build
Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
Diffstat (limited to 'test/results/flow-captured/caches_cfg')
-rw-r--r-- | test/results/flow-captured/caches_cfg/ookla.pcap.out | 1 | ||||
-rw-r--r-- | test/results/flow-captured/caches_cfg/teams.pcap.out | 4 |
2 files changed, 1 insertions, 4 deletions
diff --git a/test/results/flow-captured/caches_cfg/ookla.pcap.out b/test/results/flow-captured/caches_cfg/ookla.pcap.out index 76a45ed58..1f5694308 100644 --- a/test/results/flow-captured/caches_cfg/ookla.pcap.out +++ b/test/results/flow-captured/caches_cfg/ookla.pcap.out @@ -1,2 +1 @@ Flow 3 risky: tcp 192.168.1.7:51207 -> 46.44.253.187:80 -Flow 6 risky: tcp 192.168.1.128:35830 -> 89.96.108.170:8080 diff --git a/test/results/flow-captured/caches_cfg/teams.pcap.out b/test/results/flow-captured/caches_cfg/teams.pcap.out index f9a450ce5..4e70f518c 100644 --- a/test/results/flow-captured/caches_cfg/teams.pcap.out +++ b/test/results/flow-captured/caches_cfg/teams.pcap.out @@ -1,4 +1,3 @@ -Flow 7 risky: tcp 192.168.1.6:60535 -> 52.114.77.33:443 Flow 48 risky: tcp 192.168.1.6:60559 -> 52.114.77.33:443 Flow 64 risky: tcp 192.168.1.6:50018 -> 52.114.250.123:443 Flow 78 risky: udp 93.71.110.205:16332 -> 192.168.1.6:50016 @@ -6,11 +5,10 @@ Flow 67 risky: tcp 192.168.1.6:50021 -> 52.114.250.123:443 Flow 43 risky: tcp 192.168.1.6:60554 -> 52.113.194.132:443 Flow 36 risky: udp 192.168.1.6:61245 -> 192.168.1.1:53 Flow 4 risky: tcp 192.168.1.6:60532 -> 52.114.77.33:443 +Flow 7 risky: tcp 192.168.1.6:60535 -> 52.114.77.33:443 Flow 25 risky: tcp 192.168.1.6:60543 -> 52.114.77.33:443 Flow 51 risky: tcp 192.168.1.6:60561 -> 52.114.77.33:443 Flow 74 risky: tcp 192.168.1.6:60567 -> 52.114.77.136:443 -Flow 30 risky: tcp 192.168.1.6:60546 -> 167.99.215.164:4434 -Flow 61 risky: tcp 192.168.1.6:60566 -> 167.99.215.164:4434 Flow 60 not-detected: tcp 151.11.50.139:2222 -> 192.168.1.6:54750 Flow 60 midstream: tcp 151.11.50.139:2222 -> 192.168.1.6:54750 Flow 79 risky: udp 93.71.110.205:16333 -> 192.168.1.6:50036 |