<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/author/7hehandler/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Thu, 15 Feb 2024 19:25:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Dirty Deeds&#8230;. On Video</title>
		<link>https://warroom.rsmus.com/dirty-deeds-video/</link>
		
		<dc:creator><![CDATA[Thomas McBee]]></dc:creator>
		<pubDate>Fri, 26 May 2017 21:19:47 +0000</pubDate>
				<category><![CDATA[Physical]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Tools]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=3853</guid>

					<description><![CDATA[Recently the team and I were engaged in a physical penetration test where our goal was to gain access to multiple facilities and data deemed sensitive by the client. During our internal discussions for the engagement it was brought up that recording portions of the assessment could provide some additional benefit for the client. As [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Flash&#8230;.Thunder!</title>
		<link>https://warroom.rsmus.com/flash-thunder/</link>
		
		<dc:creator><![CDATA[Thomas McBee]]></dc:creator>
		<pubDate>Fri, 24 Feb 2017 20:07:14 +0000</pubDate>
				<category><![CDATA[Defense]]></category>
		<category><![CDATA[Offense]]></category>
		<category><![CDATA[Attack & Defense]]></category>
		<category><![CDATA[Password Reuse]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Tools]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=3574</guid>

					<description><![CDATA[So another year has passed and what an active year it was, chocked full of security events, breaches, and account dumps! Accounts that have been breached continue to pop up on multiple sale sites and we continue to see a trend that has plagued the industry for years and years&#8230; password reuse. I know what [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Penetration Panel Follow-Up: Defensive Best Practices</title>
		<link>https://warroom.rsmus.com/penetration-panel-follow-up/</link>
		
		<dc:creator><![CDATA[Thomas McBee]]></dc:creator>
		<pubDate>Fri, 18 Dec 2015 13:50:12 +0000</pubDate>
				<category><![CDATA[Defense]]></category>
		<category><![CDATA[Alerting]]></category>
		<category><![CDATA[Baselines]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Data Classification]]></category>
		<category><![CDATA[Segmentation]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=2034</guid>

					<description><![CDATA[We recently held a Penetration Panel webinar that consisted of a nice mix of our attack and defense teams. The event afforded participants an opportunity to submit questions to the experts prior to the start of the webinar. One of the questions that I was slated to answer was &#8220;Describe the best practice methods you&#8217;ve discovered [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
