Analysing Network Communications

Portfolio activities provided by Google Cybersecurity course 2024 | Completed by Emilio Mardones

View the Project on GitHub Ofendor/Portfolio1-Analysing-Network-communications

LinkedIn Badge GitHub Badge Contract, Education, Degree, Certificate, Diploma, - Certificate Icon @clipartmax.com Gmail Icon

Analysing Network Communications

Portfolio Activity 1 - DNS and ICMP Traffic Analysis

In this project, I used the information provided by a network protocol analyser to examine DNS and ICMP traffic, focusing on identifying potential security threats. By analysing IP addresses in the TCP/IP model, I gained valuable insight into suspicious data packets and learned how to detect and mitigate risks in a network traffic.

All portfolio items represent fictional companies, IP addresses, websites, and emails, used strictly for educational purposes; and provided hands-on experience in real-world cybersecurity practices.

Activity Overview

Working as a Cyber Security Analyst in a company that provides IT services, I receive reports from clients saying that they were not able to access the client company’s website www.plantbasedrecipes.com, and saw the error “destination port unreachable” after waiting for the page to load. I was tasked with analysing the situation and determine which network protocol was affected during this incident. To start, I use a network analyser tool, tcpdump, and attempt to load the webpage. The analyser showed that when I send UDP packets to the DNS server, I receive ICMP packets containing the error message: “udp port 53 unreachable”. With the information provided, I wrote a follow-up report.

This project reflects my growing expertise in network security and protocol analysis, and my commitment to building a strong foundation for a future cybersecurity career.


13:24:32.192571 IP 192.51.100.15.52444 > 203.0.113.2.domain: 35084+ A? plantbasedrecipes.com. (24)
13:24:36.098564 IP 203.0.113.2 > 192.51.100.15: ICMP 203.0.113.2 udp port 53 unreachable length 254
13:26:32.192571 IP 192.51.100.15.52444 > 203.0.113.2.domain: 35084+ A? plantbasedrecipes.com. (24)
13:27:15.934126 IP 203.0.113.2 > 192.51.100.15: ICMP 203.0.113.2 udp port 53 unreachable length 320
13:28:32.192571 IP 192.51.100.15.52444 > 203.0.113.2.domain: 35084+ A? plantbasedrecipes.com. (24)
13:28:50.022967 IP 203.0.113.2 > 192.51.100.15: ICMP 203.0.113.2 udp port 53 unreachable length 150

Report

Summary of the problem found in the tcpdump log
As shown in the data log above, the UDP protocol contacted the DNS server to retrieve the IP address that hosts the domain name of plantbasedrecipes.com. The ICMP protocol was activated to send packets containing error messages, indicating issues contacting the DNS server. The ICMP error response from the DNS server was: “udp port 53 unreachable”. Since port 53 is associated with DNS protocol traffic, this indicates an issue with the DNS server. Issues with performing the DNS protocol are further visible because the plus sign after the query identification number 35084 shows flags with the UDP message, and the “A?” symbol indicates DNS protocol operations. For this reason, the ICMP error message about port 53 likely indicates that the DNS server was not responding.
Analysis of the data and cause of the incident
The incident occurred today at 1:24 pm. Customers noticed the company that the webpage wasn’t accessible and was retrieving an error message: “destination port unreachable”. The cybersecurity team is currently investigating the issues so the clients can access the website again. During this investigation, I conducted a packet sniffing test using tcpdump. The resulting data log showed that DNS port 53 was unreachable. The next step is to identify whether the DNS server is down or traffic to port 53 is blocked by the firewall. My observation is that the DNS server might be down due to a successful DoS attack. Further investigation needs to be done to fix any misconfigurations.

LinkedIn Badge

Key Takeaways

- Network Traffic Analysis with tcpdump helped me to analyse and visualise DNS and ICMP traffic, making it easy to understand the issue that was affecting the network.

- The error returned by the ICMP protocol helped me to detect that the service was blocked, preventing the resolution of the domain plantbasedrecipes.com.

- By analysing the tcpdump data packet, I was able to engage in Real-Time Incident Response and identify a possible DoS attack or a misconfiguration in the firewall.

- Through this investigation, I enhanced my ability to diagnose network issues, provide clear reports to stakeholders, gained skills in protocol analysis, and learned how to handle DNS server errors in real-world scenarios.