Skip to content

Jvpjava/Azure-Network-Traffic-Analysis-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 

Repository files navigation

Azure-Network-Traffic-Analysis-Lab

Azure networking lab analyzing ICMP, SSH, DNS, DHCP, and RDP traffic using Wireshark.

Overview

This project demonstrates how to observe and analyze network traffic using Wireshark inside a cloud environment hosted on Microsoft Azure. Virtual machines were created inside the same virtual network to generate traffic and analyze different network protocols.

The goal of the lab was to understand how protocols such as ICMP, SSH, DHCP, DNS, and RDP behave on a network and how firewall rules affect connectivity.


Technologies Used

  • Microsoft Azure
  • Windows 10 Virtual Machine
  • Ubuntu Linux Virtual Machine
  • Wireshark
  • Remote Desktop Protocol (RDP)
  • PowerShell / Command Prompt

Environment Setup

The lab environment was built using Microsoft Azure.

Infrastructure components:

  • Resource Group
  • Virtual Network (VNet)
  • Subnet
  • Windows 10 Virtual Machine
  • Ubuntu Linux Virtual Machine

Both virtual machines were placed inside the same virtual network and subnet to allow communication between them.


Step 1 — Creating Virtual Machines

The first step was deploying cloud infrastructure in Azure.

Actions performed:

  1. Created a Resource Group in Azure.

  1. Created a Windows 10 Virtual Machine.
  2. Created an Ubuntu Linux Virtual Machine.
  3. Ensured both VMs were connected to the same Virtual Network and Subnet.

This allowed the machines to communicate with each other using private IP addresses.


Step 2 — Capturing Network Traffic with Wireshark

After connecting to the Windows VM using Remote Desktop, Wireshark was installed to monitor traffic.

Steps performed:

  1. Connected to the Windows VM using Remote Desktop Protocol (RDP).

  1. Installed Wireshark on the Windows VM.

  1. Started packet capture to observe live network traffic.

Wireshark was used to analyze different types of network packets generated during the lab.


Step 3 — Observing ICMP Traffic

To generate ICMP traffic:

  1. Retrieved the private IP address of the Ubuntu VM.
  2. Sent ping requests from the Windows VM to the Ubuntu VM.
  3. Filtered Wireshark using the ICMP protocol filter.

  1. Observed ping request and reply packets.

This demonstrated how ICMP is used for connectivity testing and network diagnostics.


Step 4 — Configuring a Firewall (Network Security Group)

A firewall rule was applied to control traffic between the machines.

Actions performed:

  1. Initiated a continuous ping from Windows VM to Ubuntu VM.

  1. Blocked inbound ICMP traffic.

  1. Observed the ping requests begin to fail.

  1. Re-enabled ICMP traffic and confirmed connectivity returned.

This demonstrated how firewall rules affect network communication.


Step 5 — Observing SSH Traffic

Next, secure remote access traffic was generated.

Steps performed:

  1. Started packet capture in Wireshark.

  1. Filtered for SSH traffic.
  2. Connected to the Ubuntu VM using SSH from the Windows VM.
  3. Ran commands inside the Linux terminal.

This allowed observation of encrypted SSH traffic packets.


Step 6 — Observing DHCP Traffic

To observe DHCP activity:

  1. Filtered Wireshark for DHCP packets.
  2. Ran the command:
ipconfig /renew

This forced the system to request a new IP address and generated DHCP traffic visible in Wireshark.


Step 7 — Observing DNS Traffic

DNS traffic was analyzed by performing domain lookups.

Command used:

nslookup google.com
nslookup disney.com

Wireshark showed DNS queries and responses resolving domain names to IP addresses.


Step 8 — Observing RDP Traffic

Wireshark was used to filter traffic using:

tcp.port == 3389

This displayed continuous Remote Desktop traffic between systems because RDP constantly streams screen updates and user input.


Skills Demonstrated

  • Cloud infrastructure deployment
  • Virtual machine networking
  • Packet analysis with Wireshark
  • Firewall configuration using Network Security Groups
  • Network protocol analysis (ICMP, SSH, DHCP, DNS, RDP)
  • Remote administration using RDP and SSH


About

Azure networking lab analyzing ICMP, SSH, DNS, DHCP, and RDP traffic using Wireshark.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors