Ok, scratch the 2nd part of this post. I was talking with my professor more about doing a MITM Attack with his computer on friday and modifying the SSH server (if i have acess to those folders) to make the server only accept weak SSH-v1 sessions.
He said dont bother and encouraged me to do something more "productive" with my time like learning python or perl.
I guess that works....but i do need a pentest report template.
(I did manage to send a e-mail out to someone)