Wireshark Basic Network Security Analysis

Skills: Wireshark, Analysis, Decryption, Encryption

What’s this?

This hands-on experience involved capturing and analyzing network traffic, decrypting passwords, and dissecting RADIUS, telnet, DNS, http, and Https . With this knowledge of Wireshark but also gained a deeper understanding of how these security measures contribute to a security posture.

Why this?

Why this.? As an entry-level security analyst I want to complete project that immersed me in the network security.  Wireshark’s open source status makes it widely use. Adding to my prior shows for Wireshark regarding packet capture I wanted to show that I may follow through with gathering information for escalation or assisting in network administration. 

Packet Capture using Wireshark 2

Skills: Monitoring and detection

What’s this?

This project serves as the second showcase of packet captures in Wireshark. The video demonstrates a step-by-step analysis of a 3-way handshake in TLS (Transport Layer Security). Additionally, I explore three different websites to illustrate the application of display filters and capture filters in Wireshark

Why this

Understanding packet exchange is fundamental for tracing, detecting, and assessing security needs. Prior to escalating any issue, the collection and review of packets associated with it become crucial. Creating this project serves as a testament to my commitment to learning beyond my classes and showcasing the skills needed for employment and career growth.

Leave a Reply

Default/ Premade Virtual Private Cloud (VPC) network configuration.

Skills practiced

Networking

What’s this?

A project that Investigates the existing default or premade elements of a Virtual Private Cloud (VPC) network configuration. I am going to delete and then set up a new auto mode network with predefined firewall rules to control network traffic. Create VM Instances using Compute Engine. Deploy virtual machine (VM) instances using Google Cloud’s Compute Engine service. Examine the connectivity options and configurations for the created VM instances within the newly established network. Overall, the tasks involve exploring default network settings, establishing a new auto mode network with specific firewall rules, deploying VM instances using Compute Engine, and, examining the connectivity aspects for these virtual machines

Why this?

As a security analyst, I understand that cloud infrastructure and configuration knowledge are essential for monitoring, investigating, and escalation. Therefore, I will familiarize myself with each layer. Everything needs to be secure. 🙂

Checking out the networks and the elements of control and focus such as firewall.

Firewall Lets play around with the firewall rules. For patching and updates an analyst should recognize the changes that may accrue with firewall modification. However deleting Firewall rules can be a final step in deleting VPC networks.

Deleting a VPC Network is a part of the end of lifecycle and has several elements depending on the network and its purpose. A playbook is a reference I may turn to if this task was presented to me. I want to verify with my supervisor before actually deleting the network.

Configuring a new Virtual Private Cloud can be done with some preset factors. Preset factors may be determined by supervisors or provided in a playbook .

Within the Network I created two VM’s to gain insight on how firewall rules change network connectivity. Currently the default rules allow all outbound and no inbound communication.

This image has an empty alt attribute; its file name is Google_VPC_Fundamentals10-1024x947.png

Here are some pings gain via Debian. Both internal and external IP

Leave a Reply