{"id":71,"date":"2022-09-21T16:13:45","date_gmt":"2022-09-21T16:13:45","guid":{"rendered":"http:\/\/totesa.website\/student\/?page_id=71"},"modified":"2025-12-01T02:13:05","modified_gmt":"2025-12-01T02:13:05","slug":"significant-projects","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/significant-projects\/","title":{"rendered":"Real Life Application\/Significant Projects"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Assignment: Ethical Hacking Lab<\/p>\n\n\n\n<p class=\"has-text-align-center\">Instructions:<\/p>\n\n\n\n<p class=\"has-text-align-center\">Task A. Exploit SMB on Windows XP with Metasploit (20 pt, 2pt each)<\/p>\n\n\n\n<p class=\"has-text-align-center\">Task B. Exploit Eternal Blue on Windows Server 2022 with Metasploit (10 pt)<\/p>\n\n\n\n<p class=\"has-text-align-center\">Task C. Exploit Windows 7 with a deliverable payload (70 pt).<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Task C cont. Privilege escalation , Background your current session, then gain administrator-level privileges on the remote system (10 pt).<\/p>\n\n\n\n<p class=\"has-text-align-center\">Submission: <a href=\"https:\/\/drive.google.com\/file\/d\/1ZCL_atLK7gWLCnwLfXnXnjsIov6ybRx-\/view?usp=sharing\">https:\/\/drive.google.com\/file\/d\/1ZCL_atLK7gWLCnwLfXnXnjsIov6ybRx-\/view?usp=sharing<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\">| <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\">Back to &#8220;Home&#8221;<\/a> | <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\"> Back to &#8220;Academics&#8221; Menu <\/a> | <\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cybersecurity-certifications\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cybersecurity-certifications\/\">| Next to &#8220;Cybersecurity Certifications&#8221; |<\/a><\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p class=\"has-text-align-center\">Cryptography for Cybersecurity Research Paper <\/p>\n\n\n\n<p class=\"has-text-align-center\">Instructions: <\/p>\n\n\n\n<p class=\"has-text-align-center\">This module is a capstone of the course. Having covered all of the relevant topics in cryptography, this module puts the knowledge into work. Due to a mix of expertise among the students in this course, you are provided a choice of a paper-based project or a programming project. Each student should make their choice and inform their choice by the respective approval due date to the instructor. This is a single-person project so it will have to be done individually.<\/p>\n\n\n\n<p class=\"has-text-align-center\">Submission: <a href=\"http:\/\/sites.wp.odu.edu\/sfloy004\/wp-content\/uploads\/sites\/30572\/2025\/06\/Course_Project-1.pdf\">http:\/\/sites.wp.odu.edu\/sfloy004\/wp-content\/uploads\/sites\/30572\/2025\/06\/Course_Project-1.pdf<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\">| <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\">Back to &#8220;Home&#8221;<\/a> | <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\"> Back to &#8220;Academics&#8221; Menu <\/a> | <\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cybersecurity-certifications\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cybersecurity-certifications\/\">| Next to &#8220;Cybersecurity Certifications&#8221; |<\/a><\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p class=\"has-text-align-center\">Elliptic Curve Cryptography Equations<\/p>\n\n\n\n<p class=\"has-text-align-center\">Instructions: <\/p>\n\n\n\n<p class=\"has-text-align-center\">Complete the following: <\/p>\n\n\n\n<p class=\"has-text-align-center\">1.Consider the equation1 y2 \u2261 x3 + 5x + 11<\/p>\n\n\n\n<p class=\"has-text-align-center\">2.What is an advantage of elliptic curve cryptography, as compared to other types of<br>cryptographic systems we have studied?<\/p>\n\n\n\n<p class=\"has-text-align-center\">3.What is an actual or potential weakness or downside of<br>elliptic curve cryptography?<\/p>\n\n\n\n<p class=\"has-text-align-center\">4.Give a new question on the topic of this week\u2019s material and its solution, suitable<br>for inclusion in future versions of this homework assignment. Your question should<br>be different from the other questions here \u2013 don\u2019t just change some values around!<br>Programming problems are acceptable too, but should be nontrivial. You can use<br>textbooks, scholarly papers, or other reputable sources of information for inspiration,<br>but you should not directly copy someone else\u2019s work. Your question should show<br>me that you understand the content well enough to ask and answer an interesting<br>question about it. Include any source code used to generate\/solve the problem.<\/p>\n\n\n\n<p class=\"has-text-align-center\">Submission : <a href=\"https:\/\/drive.google.com\/file\/d\/1Gy5PSMOZjgrGhaLFd3pXoVGXnV7K2O58\/view?usp=sharing\">https:\/\/drive.google.com\/file\/d\/1Gy5PSMOZjgrGhaLFd3pXoVGXnV7K2O58\/view?usp=sharing<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\">| <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\">Back to &#8220;Home&#8221;<\/a> | <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\"> Back to &#8220;Academics&#8221; Menu <\/a> | <\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cybersecurity-certifications\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cybersecurity-certifications\/\">| Next to &#8220;Cybersecurity Certifications&#8221; |<\/a><\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<p class=\"has-text-align-center\">Cyber Search and Seizure Warrant <\/p>\n\n\n\n<p class=\"has-text-align-center\">(Name appears as Tre Floyd instead of Stennis Floyd) <\/p>\n\n\n\n<p class=\"has-text-align-center\">Instructions: <\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Fill out the entire AO 93 warrant form (both sides), including the inventory. Attach the completed AO 93 warrant form as part of your assignment.<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>In the affidavit<\/strong>&nbsp;(submitted&nbsp;<strong>online&nbsp;<\/strong>as part of your assignment), remember your goal: to establish probable cause to search and seize the person or property described in your warrant. That means you must provide, among other things, facts and circumstances establishing that a particular federal crime was committed by someone, and that specific evidence, contraband, or instrumentalities of this crime will be found at your designated person and\/or location. I recommend that you begin your affidavit by describing what qualifications you have (like everything else here, use your knowledge and imagination). Describe the crime itself. In establishing probable cause, think about potential sources of evidence &#8211; witness\/victim interviews (what did they say), informants, surveillance, direct observations, publicly available records and information, information obtained by subpoena, social media, or any other credible source of information relevant to establishing probable cause establishing that&nbsp; a specific federal cybercrime was committed, where the evidence is located, and what might be found there.<\/p>\n\n\n\n<p class=\"has-text-align-center\">Submission: <a href=\"https:\/\/drive.google.com\/file\/d\/1d1uYffUCVW0DjQSzDRwKy6kzngWaAjdk\/view?usp=sharing\">https:\/\/drive.google.com\/file\/d\/1d1uYffUCVW0DjQSzDRwKy6kzngWaAjdk\/view?usp=sharing<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\">| <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\">Back to &#8220;Home&#8221;<\/a> | <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\"> Back to &#8220;Academics&#8221; Menu <\/a> | <\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cybersecurity-certifications\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cybersecurity-certifications\/\">| Next to &#8220;Cybersecurity Certifications&#8221; |<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Assignment: Ethical Hacking Lab Instructions: Task A. Exploit SMB on Windows XP with Metasploit (20 pt, 2pt each) Task B. Exploit Eternal Blue on Windows Server 2022 with Metasploit (10 pt) Task C. Exploit Windows 7 with a deliverable payload (70 pt). Task C cont. Privilege escalation , Background your current session, then gain administrator-level&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/significant-projects\/\">Read More<\/a><\/div>\n","protected":false},"author":24920,"featured_media":0,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/pages\/71"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/users\/24920"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/comments?post=71"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/pages\/71\/revisions"}],"predecessor-version":[{"id":530,"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/pages\/71\/revisions\/530"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/pages\/33"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/media?parent=71"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}