<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/author/nhamm/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Thu, 15 Feb 2024 19:22:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Lateral Movement with Low Privilege Shell for Red Teams</title>
		<link>https://warroom.rsmus.com/lateral-movement-with-low-privilege-shell-for-red-teams/</link>
		
		<dc:creator><![CDATA[Nicholas Hamm]]></dc:creator>
		<pubDate>Fri, 06 May 2022 15:45:26 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5687</guid>

					<description><![CDATA[After hours of OSINT (Open-Source Intelligence) and social engineering campaigns, your Red Team has finally obtained the coveted internal shell. The username, IP address, host and operating system information populates your (Command and Control) C2 framework interface, and a new stage of the engagement begins. But now that you have the shell, where do you [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>CVE and CVSS scores: Making Vulnerabilities Make Business Sense</title>
		<link>https://warroom.rsmus.com/cve-and-cvss-scores-making-vulnerabilities-make-business-sense/</link>
		
		<dc:creator><![CDATA[Nicholas Hamm]]></dc:creator>
		<pubDate>Fri, 29 Apr 2022 18:21:54 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5679</guid>

					<description><![CDATA[Late last year, news spread in the cybersecurity community about the zero-day Apache Log4j vulnerability. This vulnerability was somewhat unique—it was dangerous enough to warrant breathless news coverage, causing concern far outside of cybersecurity circles. RSM’s advice for organizations affected by the vulnerability was simply, “Drop everything and fix it. Now.” That level of urgency [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
