- Microsoft Azure (Virtual Machines/Compute)
- Remote Desktop
- Firewall and Network Security Groups
- Wireshark
- Windows 11
- Ubuntu Linux
I created a resource group that acted as a repository for this project and that holds both virtual machines.
I created the virtual machines one with Ubuntu Linux and one with Windows.
I used Remote Desktop to connect to the Windows 11 virtual machine
On the Windows 11 virtual machine I downloaded and installed Wireshark
I used the command line to ping the private IP address of the Linux virtual machine
I used Wireshark to filter for ICMP traffic and observed the traffic between the two computers after pinging the Linux Virtual Machine
I pinged www.google.com and used Wireshark to observe the interaction
I issued a perpetual ping from the Windows virtual machine to the Linux virtual machine
I then disabled the inbound ICMP traffic on the Network Security Group of the Linux virtual machine
Disabling the inbound ICMP traffic blocked the ping traffic and caused the Linux virtual machine not to respond. In Windows Virtual Machine command line the request for a ping reply from Linux began to time out.
From the Windows virtual machine command line I used SSH to connect to the Linux virtual machine
Then I filtered to view ssh (port 22) traffic only in Wireshark.
The computer uses DHCP to automatically assign an IP address so when I used the command (ipconfig /renew) it issued the Windows virtual machine a new IP address
I filtered to view DHCP (port 67) traffic only in Wireshark
I used nslookup to see what google.com and Disney.com’s IP addresses were
I filtered to view DNS (port 53) traffic only in Wireshark
I filtered to see RDP (port 3389) traffic only in Wireshark. Wireshark displays an immediate nonstop spam of RDP traffic because we are connected to the virtual machine with remote desktop. It is showing all the traffic from my personal computer, the virtual machine, and Azure servers.