diff --git a/README.md b/README.md index 5df682d8..5e1592db 100644 --- a/README.md +++ b/README.md @@ -200,7 +200,7 @@ rule-files: ### Suricata (SNI) -This ruleset includes online domains only. It enables Suricata to detect malicious HTTPS-enabled domains by inspecting the SNI in the [unencrypted ClientHello](https://en.wikipedia.org/wiki/Server_Name_Indication#Security_implications) message. There is increasing support for encrypted Client Hello which defeats SNI inspection. +This ruleset includes online domains only. It enables Suricata to detect malicious HTTPS-enabled domains by inspecting the SNI in the [unencrypted ClientHello](https://en.wikipedia.org/wiki/Server_Name_Indication#Security_implications) message. However, there is increasing support for encrypted Client Hello which defeats SNI inspection. ## Splunk diff --git a/src/script.sh b/src/script.sh index 6e9f3fb7..4a7e3527 100644 --- a/src/script.sh +++ b/src/script.sh @@ -409,7 +409,7 @@ sed -i "1i $COMMENT" "../public/phishing-filter-suricata.rules" sed -i "1s/Domains Blocklist/URL Suricata Ruleset/" "../public/phishing-filter-suricata.rules" sed -i "1i $COMMENT" "../public/phishing-filter-suricata-sni.rules" -sed -i "1s/Domains Blocklist/Domain Suricata Ruleset (SNI)/" "../public/phishing-filter-suricata-sni.rules" +sed -i "1s/Domains Blocklist/Domains Suricata Ruleset (SNI)/" "../public/phishing-filter-suricata-sni.rules" sed -i -e "1i $COMMENT" -e '1i "host","path","message","updated"' "../public/phishing-filter-splunk.csv" sed -i "1s/Domains Blocklist/URL Splunk Lookup/" "../public/phishing-filter-splunk.csv"