Logging Network Activity

Corey Wooten | Oct 5, 2024 min read

๐Ÿ”Ž Project’s Purpose

This lab simulation focused on observing and logging network activity in a secure, controlled environment using Cisco Packet Tracer. FTP traffic was created and monitored, and ICMP activity was logged through a syslog server to analyze network behavior and potential vulnerabilities.

โš™๏ธ Tools and Techniques

The lab featured command-line authentication to an FTP server, file uploads, and ICMP ping tests. Packet captures were used to expose plaintext transmissions, and syslog data was monitored to assess how routers responded to ping events in real-time.

๐Ÿงช Key Vulnerability

FTP login credentials and file data were visible in plaintext, reinforcing the importance of encrypted alternatives like SFTP in production environments.

๐Ÿง  Acquired Skills

  • Network topology simulation and device configuration
  • FTP and ICMP traffic analysis
  • Syslog logging and vulnerability detection
  • Network forensics and CLI diagnostics
  • Secure protocol awareness and threat mitigation