View on GitHub

Rodney Hall | Cybersecurity Portfolio

Hands-on cybersecurity portfolio covering SOC operations, incident triage, threat detection, identity management, cloud security, and OT/ICS environments.

Back to Portfolio

Network Traffic Analysis — Wireshark / PCAP

Overview

Analyzed BACnet and Modbus/TCP network traffic using Wireshark to characterize OT protocol behavior and establish communication baselines. Applied protocol-specific display filters, decoded NPDU and APDU packet structures, and correlated Modbus request-response sequences across captured traffic. Findings confirm that both protocols transmit device commands and operational data in cleartext with no authentication — creating a high-value target for passive monitoring and anomaly detection.

Objective

Perform passive PCAP analysis of OT network traffic to characterize protocol behavior, document device communication patterns, and produce findings applicable to detection rule development and network baselining.

Tools Used

What I Did

Evidence / Findings

BACnet display filter applied BACnet Filter Wireshark filter bacnet isolates BACnet protocol traffic — Who-Is broadcasts visible as broadcast destination frames, confirming device discovery behavior.

NPDU and APDU layers expanded BACnet NPDU APDU BACnet packet structure expanded to show NPDU (network layer) and APDU (application layer) fields — message type, device addressing, and service parameters visible in cleartext.

BACnet frame breakdown BACnet Breakdown Layer-by-layer breakdown of a BACnet frame confirming no encryption or authentication fields present at any layer.

Modbus/TCP display filter applied Modbus Filter Applied Wireshark filter isolates Modbus traffic on TCP port 502 — request and response frames separated and visible for correlation.

Modbus protocol expanded Modbus Protocol Expanded Modbus frame expanded showing function code, register address, and data values — all transmitted in cleartext with no authentication header.

Request-response correlation Modbus Request Response Modbus request and corresponding response correlated — confirms command was accepted and executed by the target device with no authentication challenge.

Outcome / Recommendations

Both BACnet and Modbus/TCP operate without encryption or authentication. A passive network tap on either protocol segment provides complete visibility into device inventory, communication patterns, and command execution — with no credentials required. This creates both a detection opportunity and a significant risk exposure: