Skip to content

REGIS513/azure-network-protocols

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 

Repository files navigation

Traffic Examination

Network Security Groups (NSGs) and Inspecting Traffic Between Azure Virtual Machines

In this tutorial, we observe various network traffic to and from Azure Virtual Machines with Wireshark as well as experiment with Network Security Groups.

Environments and Technologies Used

  • Microsoft Azure (Virtual Machines/Compute)
  • Remote Desktop
  • Various Command-Line Tools
  • Various Network Protocols (SSH, RDH, DNS, HTTP/S, ICMP)
  • Wireshark (Protocol Analyzer)

Operating Systems Used

  • Windows 10 (21H2)
  • Ubuntu Server 20.04

High-Level Steps

  • Create a Resource Group
  • Create a Windows 10 Virtual Machine
  • Create a Linux Virtual Machine
  • Ensure both VM's are in the same Virtual Network/Subnet

Actions and Observations

Disk Sanitization Steps

Within Microsoft Azure, we need to create a resource group called NSG (Network Security Groups) Once that resource group is created we need to creat two Azure Virtual Machines.


Disk Sanitization Steps

We will be creating two VM's, first one named DC-1 using Windows Server 2022, second VM will be named Client-1 using Windows 10. Create a username and password for each VM and make sure the region is the same as well. Next, we will login to both VM's using remote desktop.


Disk Sanitization Steps

Once we are logged in to both VM's, we will run PowerShell on Client-1 and attempt to ping DC-1's private IP address. Open PowerShell and run ipconfig /all the output for the DNS settings should show DC-1's private IP address.


About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published