<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/category/events/ctf/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Thu, 15 Feb 2024 19:24:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Boston Key Party CTF Crypto-200</title>
		<link>https://warroom.rsmus.com/boston-key-party-ctf-crypto-200/</link>
		
		<dc:creator><![CDATA[Spencer]]></dc:creator>
		<pubDate>Mon, 27 Feb 2017 16:33:51 +0000</pubDate>
				<category><![CDATA[Capture The Flag]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[CTF]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Python]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=3620</guid>

					<description><![CDATA[I love using sponges for crypto Who doesn&#8217;t, right? This past weekend was the Boston Key Party (BKP) CTF which was a fun and challenging event. The challenge I spent the most time working on was the Crypto 200 point challenge titled &#8220;Sponge&#8221;. The challenge was to find a collision with the known value &#8220;I [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Capture the Flag 2017 &#8211; Example Challenges</title>
		<link>https://warroom.rsmus.com/ctf-examples/</link>
		
		<dc:creator><![CDATA[Ken Smith]]></dc:creator>
		<pubDate>Thu, 26 Jan 2017 19:28:29 +0000</pubDate>
				<category><![CDATA[Capture The Flag]]></category>
		<category><![CDATA[SS-CTF]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=3139</guid>

					<description><![CDATA[Early next year, RSM will host its fourth annual Capture the Flag event. We wanted to give our potential participants some background information and examples of the types of problems they will encounter. Coding: https://warroom.rsmus.com/ctf-example-coding/ Cryptography: https://warroom.rsmus.com/ctf-example-cryptography-2/ Forensics: https://warroom.rsmus.com/forensic-files-a-ctf-beginners-guide/ Hacking: https://warroom.rsmus.com/ctf-example-hacking/ Web App Security: https://warroom.rsmus.com/ctf-example-web-application-security/ Web Application Part II: https://warroom.rsmus.com/ctf-example-web-application-security-part-ii/ Wireless: https://warroom.rsmus.com/ctf-example-wireless-security/ Physical: https://warroom.rsmus.com/ctf-example-physical-challenges/ Social [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>CTF Example &#8211; Web Application Security</title>
		<link>https://warroom.rsmus.com/ctf-example-web-application-security/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Thu, 26 Jan 2017 19:23:07 +0000</pubDate>
				<category><![CDATA[Capture The Flag]]></category>
		<category><![CDATA[SS-CTF]]></category>
		<category><![CDATA[Web App]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=3186</guid>

					<description><![CDATA[During RSM&#8217;s 2016 Capture the Flag (CTF) event, the Web Application Security category took the format of a full-blown web application penetration test.  Participants could accomplish the 100 point challenge simply by exploring and mapping out the web application.  By the time participants reached the 500 point level, they had performed password guessing, SQL injection, [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>CTF Example &#8211; Social Engineering</title>
		<link>https://warroom.rsmus.com/ctf-example-social-engineering/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Thu, 26 Jan 2017 19:09:41 +0000</pubDate>
				<category><![CDATA[Capture The Flag]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=3465</guid>

					<description><![CDATA[When a client requests a Social Engineering assessment, they are wanting to test any weaknesses found in the people themselves, not necessarily technology. After all, it&#8217;s often easier to just ask someone directly for their password instead of trying to find an exploit for an application. In the context of a penetration test, typically this [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
