<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/author/saurus/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Thu, 15 Feb 2024 19:24:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Saurus&#8217; Guide to Security+</title>
		<link>https://warroom.rsmus.com/saurus-guide-to-security/</link>
		
		<dc:creator><![CDATA[Jacob Dugan]]></dc:creator>
		<pubDate>Wed, 05 Jun 2019 20:43:25 +0000</pubDate>
				<category><![CDATA[Certifications]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Offense]]></category>
		<category><![CDATA[CompTIA]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Study Guide]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=4874</guid>

					<description><![CDATA[Hello fellow security professionals and those aspiring to be! Saurus here and excited to write to you on a new blog post. Being a consultant keeps me fairly busy. In addition to managing my workload I recently obtained my COMPTIA Security+ certification.  While the experience of taking the exam is still fresh in mind, I [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Interior Routing Protocols: The Basics</title>
		<link>https://warroom.rsmus.com/interior-routing-protocols-basics/</link>
		
		<dc:creator><![CDATA[Jacob Dugan]]></dc:creator>
		<pubDate>Fri, 21 Jul 2017 18:33:30 +0000</pubDate>
				<category><![CDATA[Defense]]></category>
		<category><![CDATA[Offense]]></category>
		<category><![CDATA[EIGRP]]></category>
		<category><![CDATA[Intro]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[RIP]]></category>
		<category><![CDATA[Routing]]></category>
		<category><![CDATA[Routing Protocols]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=4018</guid>

					<description><![CDATA[Being part of the blue team it is helpful to have familiarity with routing protocols as they help you move traffic throughout the network and if you don’t well, then you have come to a good place to start. Routing protocols can be classified into two different categories: exterior and interior. Exterior routing protocols focus [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Segmenting, Subnetting and You</title>
		<link>https://warroom.rsmus.com/segmenting-and-subnetting-and-you/</link>
		
		<dc:creator><![CDATA[Jacob Dugan]]></dc:creator>
		<pubDate>Mon, 24 Apr 2017 17:16:45 +0000</pubDate>
				<category><![CDATA[Defense]]></category>
		<category><![CDATA[Offense]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Segementation]]></category>
		<category><![CDATA[Segementting]]></category>
		<category><![CDATA[Subnetting]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=3786</guid>

					<description><![CDATA[I  completed a week of Cisco Certified Network Associate (CCNA) training and passed the exam.  I learned an interesting bit about how to quickly subnet. I would like to focus on how to subnet quickly without a calculator. For blue teamers, this skill is useful for implementing and evaluating segmentation. For red teamers, it can [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Target Locked: Game Accounts</title>
		<link>https://warroom.rsmus.com/target-locked-game-accounts/</link>
		
		<dc:creator><![CDATA[Jacob Dugan]]></dc:creator>
		<pubDate>Tue, 17 Jan 2017 14:36:45 +0000</pubDate>
				<category><![CDATA[Recreation]]></category>
		<category><![CDATA[Gaming]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=3253</guid>

					<description><![CDATA[Millions of people play video games in some way, shape, or form, from Call of Duty to World of Warcraft to Candy Crush, on multiple devices. As with anything popular, games are drawing the attention of those who want to exploit the unaware. As technology has grown, so has cybercrime, and gaming is no safe [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
