Skip to content

techwithterrence/azure-network-protocols

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 

Repository files navigation

Traffic Examination

wireshark-1

PROJECT SUMMARY -

Wireshark, Firewalls|Network Security Groups (NSGs) and Inspecting Traffic Between Azure Virtual Machines

In this tutorial, we observe various network traffic to and from Azure Virtual Machines with Wireshark as well as experiment with Network Security Groups We will also take a look at some of the protocols that are used and can bve viewed frm Wireshark.

Environments and Technologies Used

  • Microsoft Azure (Virtual Machines/Compute)
  • Remote Desktop
  • Various Command-Line Tools
  • Various Network Protocols (SSH, RDH, DNS, HTTP/S, ICMP)
  • Wireshark (Protocol Analyzer)

Operating Systems Used

  • Windows 10 (21H2)
  • Ubuntu Server 20.04

Lets-Get-Started-2-1-1024x480

Follow My Steps Below!

Part 1 (Create our Resources)

  1. Create a Resource Group

  2. Create a Windows 10 Virtual Machine (VM) a. While creating the VM, select the previously created Resource Group b. While creating the VM, allow it to create a new Virtual Network (Vnet) and Subnet image

  3. Create a Linux (Ubuntu) VM a. While create the VM, select the previously created Resource Group and Vnet

  4. Observe Your Virtual Network within Network Watcher

image

Part 2 (Observe ICMP Traffic)

  1. Use Remote Desktop to connect to your Windows 10 Virtual Machine

image

  1. Within your Windows 10 Virtual Machine, Install Wireshark

image

image

image

  1. Open Wireshark and filter for ICMP traffic only

image

  1. Retrieve the private IP address of the Ubuntu VM and attempt to ping it from within the Windows 10 VM a. Observe ping requests and replies within WireShark

image

image

  1. From The Windows 10 VM, open command line or PowerShell and attempt to ping a public website (such as www.google.com) and observe the traffic in WireShark

image

image

  1. Initiate a perpetual/non-stop ping from your Windows 10 VM to your Ubuntu VM

image

a. Open the Network Security Group your Ubuntu VM is using and disable incoming (inbound) ICMP traffic

image

image

image

b. Back in the Windows 10 VM, observe the ICMP traffic in WireShark and the command line Ping activity

image

c. Re-enable ICMP traffic for the Network Security Group your Ubuntu VM is using

image

d. Back in the Windows 10 VM, observe the ICMP traffic in WireShark and the command line Ping activity (should start working)

image

e. Stop the ping activity

Part 3 (Observe SSH Traffic)

  1. Back in Wireshark, filter for SSH traffic only

image

  1. From your Windows 10 VM, “SSH into” your Ubuntu Virtual Machine (via its private IP address)

image

a. Type commands (username, pwd, etc) into the linux SSH connection and observe SSH traffic spam in WireShark

image

b. Exit the SSH connection by typing ‘exit’ and pressing [Enter]

Part 2 (Observe DHCP Traffic)

  1. Back in Wireshark, filter for DHCP traffic only

image

  1. From your Windows 10 VM, attempt to issue your VM a new IP address from the command line (ipconfig /renew) a. Observe the DHCP traffic appearing in WireShark

image

Part 4 (Observe DNS Traffic)

  1. Back in Wireshark, filter for DNS traffic only

image

  1. From your Windows 10 VM within a command line, use nslookup to see what google.com and disney.com’s IP addresses are a. Observe the DNS traffic being show in WireShark

image

image

Part 5 (Observe RDP Traffic)

  1. Back in Wireshark, filter for RDP traffic only (tcp.port == 3389)

image

  1. Oserve the immediate non-stop spam of traffic? Why do you think it’s non-stop spamming vs only showing traffic when you do an activity? a. Answer: because the RDP (protocol) is constantly showing you a live stream from one computer to another, therefor traffic is always being transmitted

image

Lab Cleanup (DON’T FORGET THIS)

  1. Close your Remote Desktop connection

  2. Delete the Resource Group(s) created at the beginning of this lab

  3. Verify Resource Group Deletion

Complete-Stamp-1024x356

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published