Files
nDPId/test/results/flow-captured/default/WebattackSQLinj.pcap.out
Toni Uhlig 4920b2a4be Use c-captured within test/run_tests.sh.
* Some logging related modifications were required to achieve this.

Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
2023-11-11 19:16:07 +01:00

10 lines
495 B
Plaintext

Flow 1 risky: tcp 172.16.0.1:36196 -> 192.168.10.50:80
Flow 2 risky: tcp 172.16.0.1:36198 -> 192.168.10.50:80
Flow 3 risky: tcp 172.16.0.1:36200 -> 192.168.10.50:80
Flow 4 risky: tcp 172.16.0.1:36202 -> 192.168.10.50:80
Flow 5 risky: tcp 172.16.0.1:36204 -> 192.168.10.50:80
Flow 6 risky: tcp 172.16.0.1:36206 -> 192.168.10.50:80
Flow 7 risky: tcp 172.16.0.1:36208 -> 192.168.10.50:80
Flow 8 risky: tcp 172.16.0.1:36210 -> 192.168.10.50:80
Flow 9 risky: tcp 172.16.0.1:36212 -> 192.168.10.50:80