Yesterday RSM released the latest version of its open source Phishing Campaign toolkit, King Phisher. This new release includes some very exciting new features. One of the two primary new features is the addition of auto-completion for the Jinja and basic HTML tags in the message editor. King Phisher supports a large number of template variables on top of the ones built into ... READ MORE
Blog
Approaches for Wireless Man-in-the-Middle
The wireless medium is inherently susceptible to man-in-the middle attacks. Whether the objective of such an attack is to capture traffic, or simply make an "evil" access point more believable by connecting clients to the Internet, there are a few different approaches one can take to inserting themselves between their target(s) and the Internet. This post explores two of ... READ MORE
Do That Auto Complete
These days we all enjoy the ease of use in graphical text editors. Some text editors will propose suggested words as your are typing. One thing that starts to move a generic text editor into more of a Integrated Development Environment (IDE) is the ability to get auto complete suggestions for common syntax and variable names. This simple little feature greatly improves the ... READ MORE
Pretexting: Your Targets Want to, They Just Don’t Know it Yet
When conducting a social engineering engagement, be it in person or remote, your pretext can mean life or death for your engagement. First off, let's define what a pretext is. A pretext is your story. Who you are, the company you work for, your purpose, even down to how many kids you have, their names, the car you drive, etc. Depending how far you need to go, having details ... READ MORE
Personal Preparation for Active Shooter Events
It's an uncomfortable topic to address, and this is certainly a change in tone for the War Room. But unfortunately, it's 2016, and this is the world in which we live. Active Shooter events are now a significant factor in the consideration of organizational security policies and procedures and are steadily increasing in frequency year to year. According to a 2014 study by the ... READ MORE
Intro to OSINT
*All images in this post were found using publicly available sources and should be used for educational purposes only One of the best things in the IT community is Open Source Software. Open source software is something where the a company develops a piece of software and then makes the source code publicly available, allowing anyone to look and manipulate the code. This has ... READ MORE
Register Now for the RSM Capture The Flag 2016
We here at the WarRoom love this time of year as it's time for our annual Capture the Flag event. This year, we're working with Akron University and opened the CTF to both undergrad college and high school teams. Here's a little bit of the details: High School Students College Students High school students in grades 9-12. Teams will consist of 1 to 4 ... READ MORE
Let’s Build an Arcade Cabinet: The Series
Episode I: The initial purchase of materials and the assembly of the side panels and kick plate. Episode II: Addition of the coin door and assembly of the lower half of the cabinet. Episode III: Completion of the shell and addition of the control panel. Episode IV: Sanding, priming, and more sanding along with the addition of our cup holders Episode V: Final ... READ MORE
Do that Phish: King Phisher Video Guides
The Importance of Phishing Over the last few years, trending has emerged that clearly indicates social engineering, specifically phishing, is the most consistently reliable attack vector through which hackers gain access to target organizations. Given the non-technical, weak-link factor involved in responding to a well crafted phishing attack, how can organization best combat ... READ MORE
Let’s Build an Arcade Cabinet: Episode III
Last week, I was going back through the arcade cabinet posts, and I realized we started this project way back in October. So, our new goal is to get it up and running by the end of March with everything finished except for the artwork which our graphic design team will be doing internally. Changes in Design In the interest of time, we've opted to purchase a fully ... READ MORE










