aboutsummaryrefslogtreecommitdiff
path: root/test/results/flow-captured/caches_cfg
diff options
context:
space:
mode:
authorToni Uhlig <matzeton@googlemail.com>2024-11-11 16:19:07 +0100
committerToni Uhlig <matzeton@googlemail.com>2024-11-13 17:23:31 +0100
commit9efdecf4efa352a6046c88a945cf9ff8db1b37b9 (patch)
tree43c6ba4a106f47420a4f5dc1ddfe393400c5dbda /test/results/flow-captured/caches_cfg
parent8c114e49168eb38a8598b5b342c7144a07323320 (diff)
bump libnDPI to 59ee1fe1156be234fed796972a29a31a0589e25a
* set minimum nDPI version to 4.12.0 (incompatible API changes) * fixed `ndpi_debug_printf()` function signature * JSON schema (flow): added risk `56`: "Obfuscated Traffic" * JSON schema (flow): added "domainame" * fixed OpenWrt build Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
Diffstat (limited to 'test/results/flow-captured/caches_cfg')
-rw-r--r--test/results/flow-captured/caches_cfg/ookla.pcap.out1
-rw-r--r--test/results/flow-captured/caches_cfg/teams.pcap.out4
2 files changed, 1 insertions, 4 deletions
diff --git a/test/results/flow-captured/caches_cfg/ookla.pcap.out b/test/results/flow-captured/caches_cfg/ookla.pcap.out
index 76a45ed58..1f5694308 100644
--- a/test/results/flow-captured/caches_cfg/ookla.pcap.out
+++ b/test/results/flow-captured/caches_cfg/ookla.pcap.out
@@ -1,2 +1 @@
Flow 3 risky: tcp 192.168.1.7:51207 -> 46.44.253.187:80
-Flow 6 risky: tcp 192.168.1.128:35830 -> 89.96.108.170:8080
diff --git a/test/results/flow-captured/caches_cfg/teams.pcap.out b/test/results/flow-captured/caches_cfg/teams.pcap.out
index f9a450ce5..4e70f518c 100644
--- a/test/results/flow-captured/caches_cfg/teams.pcap.out
+++ b/test/results/flow-captured/caches_cfg/teams.pcap.out
@@ -1,4 +1,3 @@
-Flow 7 risky: tcp 192.168.1.6:60535 -> 52.114.77.33:443
Flow 48 risky: tcp 192.168.1.6:60559 -> 52.114.77.33:443
Flow 64 risky: tcp 192.168.1.6:50018 -> 52.114.250.123:443
Flow 78 risky: udp 93.71.110.205:16332 -> 192.168.1.6:50016
@@ -6,11 +5,10 @@ Flow 67 risky: tcp 192.168.1.6:50021 -> 52.114.250.123:443
Flow 43 risky: tcp 192.168.1.6:60554 -> 52.113.194.132:443
Flow 36 risky: udp 192.168.1.6:61245 -> 192.168.1.1:53
Flow 4 risky: tcp 192.168.1.6:60532 -> 52.114.77.33:443
+Flow 7 risky: tcp 192.168.1.6:60535 -> 52.114.77.33:443
Flow 25 risky: tcp 192.168.1.6:60543 -> 52.114.77.33:443
Flow 51 risky: tcp 192.168.1.6:60561 -> 52.114.77.33:443
Flow 74 risky: tcp 192.168.1.6:60567 -> 52.114.77.136:443
-Flow 30 risky: tcp 192.168.1.6:60546 -> 167.99.215.164:4434
-Flow 61 risky: tcp 192.168.1.6:60566 -> 167.99.215.164:4434
Flow 60 not-detected: tcp 151.11.50.139:2222 -> 192.168.1.6:54750
Flow 60 midstream: tcp 151.11.50.139:2222 -> 192.168.1.6:54750
Flow 79 risky: udp 93.71.110.205:16333 -> 192.168.1.6:50036