• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

War Room

Shells From Above

RSM logo

  • Home
  • About
  • Blog
  • Talks/Whitepapers
  • Tools
  • Recreation

Blog

King Phisher 1.3 Released

May 18, 2016 By Spencer

king fisher logo

Yesterday RSM released the latest version of its open source Phishing Campaign toolkit, King Phisher. This new release includes some very exciting new features. One of the two primary new features is the addition of auto-completion for the Jinja and basic HTML tags in the message editor. King Phisher supports a large number of template variables on top of the ones built into ... READ MORE

Approaches for Wireless Man-in-the-Middle

May 17, 2016 By RSM Author

The wireless medium is inherently susceptible to man-in-the middle attacks. Whether the objective of such an attack is to capture traffic, or simply make an "evil" access point more believable by connecting clients to the Internet, there are a few different approaches one can take to inserting themselves between their target(s) and the Internet. This post explores two of ... READ MORE

Do That Auto Complete

May 5, 2016 By RSM Author

These days we all enjoy the ease of use in graphical text editors. Some text editors will propose suggested words as your are typing.  One thing that starts to move a generic text editor into more of a Integrated Development Environment (IDE) is the ability to get auto complete suggestions for common syntax and variable names. This simple little feature greatly improves the ... READ MORE

Pretexting: Your Targets Want to, They Just Don’t Know it Yet

April 29, 2016 By Jeremy

When conducting a social engineering engagement, be it in person or remote, your pretext can mean life or death for your engagement. First off, let's define what a pretext is. A pretext is your story. Who you are, the company you work for, your purpose, even down to how many kids you have, their names, the car you drive, etc. Depending how far you need to go, having details ... READ MORE

Personal Preparation for Active Shooter Events

April 18, 2016 By Ken Smith

It's an uncomfortable topic to address, and this is certainly a change in tone for the War Room. But unfortunately, it's 2016, and this is the world in which we live. Active Shooter events are now a significant factor in the consideration of organizational security policies and procedures and are steadily increasing in frequency year to year. According to a 2014 study by the ... READ MORE

Intro to OSINT

April 1, 2016 By RSM Author

*All images in this post were found using publicly available sources and should be used for educational purposes only One of the best things in the IT community is Open Source Software. Open source software is something where the a company develops a piece of software and then makes the source code publicly available, allowing anyone to look and manipulate the code. This has ... READ MORE

Register Now for the RSM Capture The Flag 2016

March 15, 2016 By Jeremy

We here at the WarRoom love this time of year as it's time for our annual Capture the Flag event. This year, we're working with Akron University and opened the CTF to both undergrad college and high school teams. Here's a little bit of the details: High School Students College Students High school students in grades 9-12. Teams will consist of 1 to 4 ... READ MORE

Let’s Build an Arcade Cabinet: The Series

March 11, 2016 By Ken Smith

Episode I: The initial purchase of materials and the assembly of the side panels and kick plate. Episode II: Addition of the coin door and assembly of the lower half of the cabinet. Episode III: Completion of the shell and addition of the control panel. Episode IV: Sanding, priming, and more sanding along with the addition of our cup holders Episode V: Final ... READ MORE

Do that Phish: King Phisher Video Guides

March 2, 2016 By RSM Author

The Importance of Phishing Over the last few years, trending has emerged that clearly indicates social engineering, specifically phishing, is the most consistently reliable attack vector through which hackers gain access to target organizations. Given the non-technical, weak-link factor involved in responding to a well crafted phishing attack, how can organization best combat ... READ MORE

Let’s Build an Arcade Cabinet: Episode III

March 2, 2016 By Ken Smith

Last week, I was going back through the arcade cabinet posts, and I realized we started this project way back in October. So, our new goal is to get it up and running by the end of March with everything finished except for the artwork which our graphic design team will be doing internally. Changes in Design In the interest of time, we've opted to purchase a fully ... READ MORE

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 15
  • Page 16
  • Page 17
  • Page 18
  • Page 19
  • Interim pages omitted …
  • Page 27
  • Go to Next Page »

Primary Sidebar

Categories

  • Defense
  • Forensics
  • Offense
  • Physical
  • R&D

Most Viewed Posts

  • DLL Injection Part 1: SetWindowsHookEx 11.1k views
  • Sophos UTM Home Edition – 3 – The Setup 10.9k views
  • Leveraging MS16-032 with PowerShell Empire 10.1k views
  • Bypassing Gmail’s Malicious Macro Signatures 10k views
  • How to Bypass SEP with Admin Access 9.1k views

Footer

  • Facebook
  • LinkedIn
  • Twitter
  • Tools
  • About
  • RSM US LLP

(312) 634-3400

30 S. Wacker Drive Suite 3300
Chicago, IL 60606

Copyright © 2026 RSM US LLP. All rights reserved. RSM US LLP is a limited liability partnership and the U.S. member firm of RSM International, a global network of independent audit, tax and consulting firms. The member firms of RSM International collaborate to provide services to global clients, but are separate and distinct legal entities that cannot obligate each other. Each member firm is responsible only for its own acts and omissions, and not those of any other party. Visit for more information regarding RSM US LLP and RSM International.