<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/author/krandall/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Thu, 15 Feb 2024 19:22:50 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Wi-Fi Security and Design Considerations</title>
		<link>https://warroom.rsmus.com/wi-fi-security-and-design-considerations/</link>
		
		<dc:creator><![CDATA[Kevin Randall]]></dc:creator>
		<pubDate>Wed, 09 Mar 2022 18:58:02 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<category><![CDATA[Wi-Fi Design]]></category>
		<category><![CDATA[Wi-Fi Security]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5633</guid>

					<description><![CDATA[&#160; When wireless networks are created and designed in the modern enterprise, security for these networks is necessary, but so is ensuring the business requirements are aligned. Everything from antenna placement, conducting site surveys, antennas used, supported cipher suites, authentication protocols, and the EAP type used can all play a role in the security of [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>WMI &#038; PowerShell for Offensive Security</title>
		<link>https://warroom.rsmus.com/wmi-powershell-for-offensive-security/</link>
		
		<dc:creator><![CDATA[Kevin Randall]]></dc:creator>
		<pubDate>Mon, 24 Jan 2022 17:19:50 +0000</pubDate>
				<category><![CDATA[Offense]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5602</guid>

					<description><![CDATA[As a penetration tester, learning how to use a CLI (Command Line Interface) is a necessary skill as there are many times where an interactive interface such as Remote Desktop won’t be available. Starting with a standard command prompt for Windows (cmd.exe) is a great start. However, there are more advanced and feature rich CLI [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Cisco Smart Install for Penetration Testing</title>
		<link>https://warroom.rsmus.com/cisco-smart-install-for-penetration-testing/</link>
		
		<dc:creator><![CDATA[Kevin Randall]]></dc:creator>
		<pubDate>Thu, 25 Feb 2021 14:52:55 +0000</pubDate>
				<category><![CDATA[Offense]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5402</guid>

					<description><![CDATA[Cisco Systems Inc. developed a widely used protocol to perform zero touch deployment of new infrastructure. This can include devices such as switches and routers and many other devices running Cisco IOS. This technology is called Smart Install. Smart Install runs on TCP port 4786 and requires no authentication to connect to the remote service. [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
