{"id":123,"date":"2022-01-25T16:30:54","date_gmt":"2022-01-25T16:30:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2025-04-22T15:17:55","modified_gmt":"2025-04-22T15:17:55","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/gridg02\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Techniques and Operations<\/h1>\n<p>This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, students will explore and map networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing. The objectives are:<\/p>\n<ul>\n<li>Understand the concepts and major constructs of the C programming language,<\/li>\n<li>Master the programming skills of the C programming language,<\/li>\n<li>Be able to analyze the C source code to infer the functionality of a given code segment, C function, C program etc,<\/li>\n<li>Grasp the needed techniques and skills to write a C program in cybersecurity operations such as a network protocol stack,<\/li>\n<li>Monitor and analyze network traffic. Identify and trace the traffic when intrusion is detected in the network,<\/li>\n<li>Identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network,<\/li>\n<li>Master the technologies to exploit the vulnerabilities in a remote system,<\/li>\n<li>Analyze the vulnerabilities in wireless communication network,<\/li>\n<li>Manage data and personal information in a secure manner.<\/li>\n<\/ul>\n<h1>Course Material<\/h1>\n<p>There are both programming assignments for C programming and hands-on labs for cybersecurity and operations.\u00a0Please include some of the materials (listed below) that you produced within the course, explaining what you did and how these projects helped you engage with the outcomes listed above.<\/p>\n<p>The programming assignments are as follows:<\/p>\n<ol>\n<li>Write a function htoi(s), which concerts a string of hexadecimal digits into its equivalent integer value.<\/li>\n<li>Write a function any(s1, s2) that returns the first location in the string s1 where any character from the string s2 occurs, or -1 if s1 contains no characters from s2.<\/li>\n<li>Using pointer, write a function strcat(s, t) that copies string t to the end of string s<\/li>\n<li>Write a program expr, which evaluates a reverse Polish expression from the command line. For example expr 2 3 4 + * evaluates 2* (3 + 4).<\/li>\n<li>Write a program to compare two files, printing the first line where they differ.<\/li>\n<\/ol>\n<p>The hands-on labs are as follows:<\/p>\n<ol>\n<li>Traffic tracing through Wireshark and TCPdump<\/li>\n<li>Firewall configuration with pfSense<\/li>\n<li>Penetration test on Windows<\/li>\n<li>Password cracking<\/li>\n<li>Information hiding<\/li>\n<\/ol>\n<p class=\"p1\"><strong>A few examples of the assignment that I was able to acquire:<\/strong><\/p>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/annotated-Assignment202.120-20Get20started20with20Wireshark28v229-2-12028129.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assignment202.120-20Get20started20with20Wireshark28v229-2-12028129.\"><\/object><a id=\"wp-block-file--media-e86f5da6-635d-4714-bfdd-dd527e07e977\" href=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/annotated-Assignment202.120-20Get20started20with20Wireshark28v229-2-12028129.pdf\">annotated-Assignment202.120-20Get20started20with20Wireshark28v229-2-12028129<\/a><a href=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/annotated-Assignment202.120-20Get20started20with20Wireshark28v229-2-12028129.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e86f5da6-635d-4714-bfdd-dd527e07e977\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/annotated-Assignment20320-20Sword20vs.20Shield.pdf.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assignment20320-20Sword20vs.20Shield.pdf.\"><\/object><a id=\"wp-block-file--media-8ddf13e6-7ae0-448e-8e49-43ebf531377f\" href=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/annotated-Assignment20320-20Sword20vs.20Shield.pdf.pdf\">annotated-Assignment20320-20Sword20vs.20Shield.pdf<\/a><a href=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/annotated-Assignment20320-20Sword20vs.20Shield.pdf.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8ddf13e6-7ae0-448e-8e49-43ebf531377f\">Download<\/a><\/div>\n\n\n\n<p>CYSE 301: Cybersecurity Technique and Operations<\/p>\n\n\n\n<p><strong>Assignment 4: Password Cracking (Part A)<\/strong><\/p>\n\n\n\n<p>At the end of this module, each student needs to submit a report that includes the solutions to the following tasks. Make sure you take a screenshot for every single step as proof. You need to use<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Task A: Linux Password Cracking (25 points)<\/h1>\n\n\n\n<p>File too big, copy and pasted&#8230;<\/p>\n\n\n\n<ol>\n<li><strong>5 points. <\/strong>Create two groups, one is <strong>cyse301s23<\/strong>, and the other is your ODU Midas ID (for example, pjiang). Then display\u00a0the\u00a0corresponding\u00a0group\u00a0IDs.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"615\" height=\"350\" src=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image.jpeg\" alt=\"\" class=\"wp-image-431\" srcset=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image.jpeg 615w, https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-300x171.jpeg 300w, https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-527x300.jpeg 527w\" sizes=\"(max-width: 615px) 100vw, 615px\" \/><\/figure>\n\n\n\n<ul>\n<li><strong>5 points. <\/strong>Create and assign three users to each group. Display related UID and GID information of each user.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"629\" height=\"357\" src=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-1.jpeg\" alt=\"\" class=\"wp-image-432\" srcset=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-1.jpeg 629w, https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-1-300x170.jpeg 300w, https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-1-529x300.jpeg 529w\" sizes=\"(max-width: 629px) 100vw, 629px\" \/><\/figure>\n\n\n\n<ul>\n<li><strong>5 points. <\/strong>Choose six new passwords, <strong>from easy to hard<\/strong>, and assign them to the users you created. You need to show me the password you selected in your report, and <strong>DO NOT <\/strong>use your real-world passwords.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"615\" height=\"698\" src=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image.gif\" alt=\"\" class=\"wp-image-436\" \/><\/figure>\n\n\n\n<ul>\n<li><strong>5 points. <\/strong>Export all six users\u2019 password hashes into a file named \u201c<strong>YourMIDAS-HASH<\/strong>\u201d (for example, pjiang-HASH). Then launch a dictionary attack to crack the passwords. You MUST crack at least one password\u00a0in\u00a0order\u00a0to\u00a0complete this\u00a0assignment.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"629\" height=\"357\" src=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-3.jpeg\" alt=\"\" class=\"wp-image-434\" srcset=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-3.jpeg 629w, https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-3-300x170.jpeg 300w, https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-3-529x300.jpeg 529w\" sizes=\"(max-width: 629px) 100vw, 629px\" \/><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Task B: Windows Password Cracking (25 points)<\/h1>\n\n\n\n<p>Log on to Windows 7 VM and create a list of 3 users with different passwords. Then you need to establish a reverse shell connection with the admin privilege to the target Windows 7 VM.<\/p>\n\n\n\n<p>Now, complete the following tasks:<\/p>\n\n\n\n<ol>\n<li><strong><\/strong><strong>5 points. <\/strong>Display the password hashes by using the \u201chashdump\u201d command in the meterpreter shell. Then<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"354\" src=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-2.jpeg\" alt=\"\" class=\"wp-image-433\" srcset=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-2.jpeg 630w, https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-2-300x169.jpeg 300w, https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-2-534x300.jpeg 534w\" sizes=\"(max-width: 630px) 100vw, 630px\" \/><\/figure>\n\n\n\n<ul>\n<li><strong>10 points. <\/strong>Save the password hashes into a file named \u201c<strong>your_midas.WinHASH<\/strong>\u201d in Kali Linux (you need to replace the \u201cyour_midas\u201d with your university MIDAS ID). Then run John the ripper for <strong>10 minutes <\/strong>to crack the passwords (You MUST crack at least one password in order to complete this assignment.).<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"629\" height=\"315\" src=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-4.jpeg\" alt=\"\" class=\"wp-image-435\" srcset=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-4.jpeg 629w, https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-4-300x150.jpeg 300w, https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-4-600x300.jpeg 600w\" sizes=\"(max-width: 629px) 100vw, 629px\" \/><\/figure>\n\n\n\n<ul>\n<li><strong>10 points. <\/strong>Upload the password cracking tool, <strong>Cain and Abel, <\/strong>to the remote Windows 7 VM, and install it via a remote desktop window. Then, implement <strong>BOTH <\/strong>brute force and dictionary attacks to crack the passwords. (You MUST crack at least one password in order to complete this assignment.).<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"623\" height=\"391\" src=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-5.jpeg\" alt=\"\" class=\"wp-image-437\" srcset=\"https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-5.jpeg 623w, https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-5-300x188.jpeg 300w, https:\/\/sites.wp.odu.edu\/gridg02\/wp-content\/uploads\/sites\/28311\/2025\/04\/image-5-478x300.jpeg 478w\" sizes=\"(max-width: 623px) 100vw, 623px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, students&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gridg02\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":23330,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/users\/23330"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":439,"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/pages\/123\/revisions\/439"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}