<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/category/events/recreation/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Thu, 15 Feb 2024 19:24:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CVE 2022 30190 &#8220;Follina&#8221;</title>
		<link>https://warroom.rsmus.com/cve-2022-30190-follina/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Fri, 10 Jun 2022 20:19:28 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[Recreation]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5715</guid>

					<description><![CDATA[Have you ever had to download a Microsoft Word document from a co-worker, friend, family member? I know I have. Now imagine you think you receive a Word document from your boss titled “New Promotions/Raises”. Without thinking, you go to download and access the file, and then a weird window pops up about Microsoft Windows [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Target Locked: Game Accounts</title>
		<link>https://warroom.rsmus.com/target-locked-game-accounts/</link>
		
		<dc:creator><![CDATA[Jacob Dugan]]></dc:creator>
		<pubDate>Tue, 17 Jan 2017 14:36:45 +0000</pubDate>
				<category><![CDATA[Recreation]]></category>
		<category><![CDATA[Gaming]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=3253</guid>

					<description><![CDATA[Millions of people play video games in some way, shape, or form, from Call of Duty to World of Warcraft to Candy Crush, on multiple devices. As with anything popular, games are drawing the attention of those who want to exploit the unaware. As technology has grown, so has cybercrime, and gaming is no safe [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>CTF Example &#8211; Coding</title>
		<link>https://warroom.rsmus.com/ctf-example-coding/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Mon, 16 Jan 2017 14:18:23 +0000</pubDate>
				<category><![CDATA[Capture The Flag]]></category>
		<category><![CDATA[Recreation]]></category>
		<category><![CDATA[Coding]]></category>
		<category><![CDATA[SS-CTF]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=3204</guid>

					<description><![CDATA[You sit there in front of your desk after getting hired in to a security position, and quickly realize that it is no point-and-click job. Security on both sides of the house leverage the power of programming to automate tasks. This can be anything from alerting on specific key words on logs, to making a [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>CTF Example &#8211; Wireless Security</title>
		<link>https://warroom.rsmus.com/ctf-example-wireless-security/</link>
		
		<dc:creator><![CDATA[Ken Smith]]></dc:creator>
		<pubDate>Mon, 16 Jan 2017 14:18:01 +0000</pubDate>
				<category><![CDATA[Capture The Flag]]></category>
		<category><![CDATA[Recreation]]></category>
		<category><![CDATA[SS-CTF]]></category>
		<category><![CDATA[Wireless]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=3142</guid>

					<description><![CDATA[Each of RSM&#8217;s previous Capture the Flag events has included a challenge in which participants were tasked with tracking down a specific wireless access point. There are many examples of the practical applications of being able to accomplish such a task. These include manually verifying potential rogue access points and signal triangulation (which is an [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
