Skip to content

Creating an environment that allows us to greater understand the processes of some of the most popular internet protocols. The list does not stop here, this can be done to monitor any protocol you are curious about.

Notifications You must be signed in to change notification settings

henryossinger/Network-Protocols

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 

Repository files navigation

Traffic Examination

Network Security Groups (NSGs) and Inspecting Traffic Between Azure Virtual Machines

In this tutorial, we observe various network traffic to and from Azure Virtual Machines with Wireshark as well as experiment with Network Security Groups.

Environments and Technologies Used

  • Microsoft Azure (Virtual Machines/Compute)
  • Remote Desktop
  • Various Command-Line Tools
  • Various Network Protocols (SSH, RDH, DNS, HTTP/S, ICMP)
  • Wireshark (Protocol Analyzer)

Operating Systems Used

  • Windows 10 (21H2)
  • Ubuntu Server 20.04

High-Level Steps

  • Creating the VM's
  • Installing Wireshark
  • Observing network traffic with Wireshark

Actions and Observations

Disk Sanitization Steps

1. Creating the VM's in Azure

First we must create 2 VM's to send network traffic between. For the main VM we will be using I am running Windows 10, and for the other VM I used Ubuntu server.

I created both of these in Azure, but this can be done with any VM application.


Disk Sanitization Steps

2. Installing Wireshark

Once completed, boot up the main VM and search download wireshark in google. The installation is pretty straightforward, and once completed wireshark should automatically open. We can now begin sending / receiving data and analyze how protocols work in more detail.

Since my VM is in Azure, wireshark is automatically running tons of traffic.


Disk Sanitization Steps

3. Observing ICMP Traffic

Now that we have wireshark, let's observe some protocols in action. In windows powershell I ping the IP address of our Ubuntu server and observe what wireshark captures. In the filters bar on the top left in wireshark enter icmp. We do this so wireshark only shows us traffic from our pings. Now we can see in wireshark echo requests are being sent from our IP address (Source IP), and being received by the Ubuntu server (Destination IP). If the Ubuntu server had a firewall that was blocking ICMP packets, we would not be receiving replies back.


Disk Sanitization Steps Disk Sanitization Steps

4. Observing SSH Traffic

Next, we will SSH login to the Ubuntu server and observe the traffic wireshark shows us. We do this in Powershell by typing "ssh (username)@(VM's IP)". Immediately after we type this we see Elliptic Curve Deffie-Hellman Key traffic. This is a protocol that establishes a shared secret connection channel between two devices. Next we input the password for the Ubuntu VM, and we are fully logged in. You will now see that the command line changes color and is using bash (linux commands). Anything we type in the terminal will be shown on wireshark.


Disk Sanitization Steps

5. Observing DHCP Traffic

Next we will look at DHCP traffic. This is the protocol that automatically assigns device's an IP address so they don't have to be manually configured. We can force some of this traffic by forcing a DHCP renewal of our IP address. We type ipconfig /renew in powershell to perform this action. Once entered we see a DHCPREQUEST and DHCPACK packets.


Disk Sanitization Steps

6. Observing DNS Traffic

Finally, we will observe DNS traffic. DNS is the protocol that takes human readable names like "google.com" and converts them into IP addresses so your computer knows where to route. We can generate some traffic in Powershell again using "nslookup google.com" command. Once entered we can see all the information our computer received about the domain google.com, as well as some IP addresses of google servers.


About

Creating an environment that allows us to greater understand the processes of some of the most popular internet protocols. The list does not stop here, this can be done to monitor any protocol you are curious about.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published