<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/category/backtobasics/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Wed, 15 Oct 2025 13:20:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Back to Basics: Phishing</title>
		<link>https://warroom.rsmus.com/back-to-basics-phishing/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Mon, 01 May 2023 16:00:38 +0000</pubDate>
				<category><![CDATA[Back to Basics]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[Attack Vectors]]></category>
		<category><![CDATA[how to]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Phishing Campaign Toolkit]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5993</guid>

					<description><![CDATA[Anyone with an email address has likely received suspicious messages in their inbox from time to time. These messages usually come from unfamiliar senders and try to get the recipient to perform some kind of action, like clicking a link or providing sensitive information. The message might even contain scare tactics intended to convince the [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Back To Basics: NTLM Relay</title>
		<link>https://warroom.rsmus.com/how-to-perform-ntlm-relay/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Wed, 04 Jan 2023 22:42:23 +0000</pubDate>
				<category><![CDATA[Back to Basics]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Real World]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Tutorial]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5896</guid>

					<description><![CDATA[Despite being a veteran protocol, New Technology Lan Manager (NTLM) remains one of the most common authentication protocols used in Windows environments. Even though Kerberos offers enhanced security features over NTLM, many systems and functions still depend on NTLM, making it impossible for most organizations to move away from it entirely. Unfortunately, there are a [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Back to Basics: Brute Forcing Techniques</title>
		<link>https://warroom.rsmus.com/back-to-basics-brute-forcing-techniques/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Wed, 16 Nov 2022 17:07:26 +0000</pubDate>
				<category><![CDATA[Back to Basics]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[Metasploit]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5885</guid>

					<description><![CDATA[During an attack, a threat actor can often enumerate leverageable information through open-source intelligence (OSINT) gathering techniques. This can include information on users that are present on the target environment, such as usernames and email addresses. Often, a threat actor can use this information to craft a targeted list of users to facilitate a variety [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Back to Basics: Kerberoasting</title>
		<link>https://warroom.rsmus.com/how-to-perform-kerberoasting/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Wed, 26 Oct 2022 20:51:38 +0000</pubDate>
				<category><![CDATA[Back to Basics]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[impacket]]></category>
		<category><![CDATA[kerbreroasting]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[pentesting]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5861</guid>

					<description><![CDATA[Welcome back to our &#8220;Back to Basics&#8221; series, where we provide you with an overview of the bread and butter pentesting techniques that we regularly see compromise networks. In this week&#8217;s installment, we&#8217;re looking at Kerberoasting. Kerberoasting is a method to capture hashed passwords using the Kerberos network authentication protocol. This protocol protects network services [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
