{"id":351,"date":"2026-04-26T03:15:31","date_gmt":"2026-04-26T03:15:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-ctayl086\/?page_id=351"},"modified":"2026-04-26T03:30:48","modified_gmt":"2026-04-26T03:30:48","slug":"ethical-hacking-and-penetration-testing","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse-ctayl086\/ethical-hacking-and-penetration-testing\/","title":{"rendered":"Ethical Hacking and Penetration Testing"},"content":{"rendered":"\n<p><strong>Penetration Testing Lab<\/strong><\/p>\n\n\n\n<p><strong>Skill Demonstrated:<\/strong> Ethical Hacking and Penetration Testing<\/p>\n\n\n\n<p><strong>Problem:<\/strong> During this assignment, I had to successfully use Kali Linux to exploit a Server Message Block and EternalBlue vulnerabilities on a Windows XP and 2022 server using Metasploit. Lastly, I had to exploit a Windows 7 server using a payload I created.<\/p>\n\n\n\n<p><strong>Action:<\/strong> I created a detailed document including pictures of each step I used when completing the assignment through Kali Linux. I used various commands to run port scans, open Metasploit, set\/create payloads, get system information, establish reverse shell connections and give admin privileges.<\/p>\n\n\n\n<p><strong>Result:<\/strong> This artifact shows I have detailed understandings on how to code in Linux-based environments and can connect to Windows systems, which are widely used in the workplace. I also know how to safely and ethically hack into systems using a payload, Metasploit, and EternalBlue.<\/p>\n\n\n\n<p>CYSE 301:<strong>Linux-Based Password Cracking<\/strong><\/p>\n\n\n\n<p>Skill Demonstrated:<\/p>\n\n\n\n<p>Problem:<\/p>\n\n\n\n<p>Action:<\/p>\n\n\n\n<p>Result:<\/p>\n\n\n\n<p>CYSE 450: <strong>SQL Injection Attack:<\/strong><\/p>\n\n\n\n<p>Skill Demonstrated:<\/p>\n\n\n\n<p>Problem:<\/p>\n\n\n\n<p>Action:<\/p>\n\n\n\n<p>Result:<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Penetration Testing Lab Skill Demonstrated: Ethical Hacking and Penetration Testing Problem: During this assignment, I had to successfully use Kali Linux to exploit a Server Message Block and EternalBlue vulnerabilities on a Windows XP and 2022 server using Metasploit. Lastly, I had to exploit a Windows 7 server using a payload I created. Action: I&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse-ctayl086\/ethical-hacking-and-penetration-testing\/\">Read More<\/a><\/div>\n","protected":false},"author":29117,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-ctayl086\/wp-json\/wp\/v2\/pages\/351"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-ctayl086\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-ctayl086\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-ctayl086\/wp-json\/wp\/v2\/users\/29117"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-ctayl086\/wp-json\/wp\/v2\/comments?post=351"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/cyse-ctayl086\/wp-json\/wp\/v2\/pages\/351\/revisions"}],"predecessor-version":[{"id":367,"href":"https:\/\/sites.wp.odu.edu\/cyse-ctayl086\/wp-json\/wp\/v2\/pages\/351\/revisions\/367"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-ctayl086\/wp-json\/wp\/v2\/media?parent=351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}