<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/category/offense/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Thu, 15 Feb 2024 19:22:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Red Team Assessments vs Penetration Testing Assessments</title>
		<link>https://warroom.rsmus.com/red-team-assessments-vs-penetration-testing-assessments/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Thu, 18 May 2023 15:01:22 +0000</pubDate>
				<category><![CDATA[Offense]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Real World]]></category>
		<category><![CDATA[red team]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=6017</guid>

					<description><![CDATA[At RSM, one of our goals is to help guide the client into choosing the right test for them. This isn’t always as simple as it sounds, as it takes into consideration factors such as goals or size of the network. One of the most common questions we receive are on the difference between a [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Managed Vs. Federated Office 365: What’s the Difference?</title>
		<link>https://warroom.rsmus.com/managed-vs-federated-office-365-whats-the-difference/</link>
		
		<dc:creator><![CDATA[Ryan Shockling]]></dc:creator>
		<pubDate>Tue, 14 Mar 2023 20:20:22 +0000</pubDate>
				<category><![CDATA[Offense]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Enumeration]]></category>
		<category><![CDATA[O365]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Pentest]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5971</guid>

					<description><![CDATA[When considering the methods of attack an organization should defend itself, what comes to mind? Certainly, you should defend yourself against the most devastating forms of attack. That missing patch that leads to full domain compromise? Take care of that immediately. That password policy that means everyone uses “1234”? Should probably look at that too. [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>How to Perform OGNL Injection</title>
		<link>https://warroom.rsmus.com/how-to-perform-ognl-injection/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Thu, 02 Feb 2023 21:53:12 +0000</pubDate>
				<category><![CDATA[Offense]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[Injection]]></category>
		<category><![CDATA[OGNL]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Phishing Campaign Toolkit]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Tutorial]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5942</guid>

					<description><![CDATA[While we frequently discuss SQL injection and command injection, OGNL injection receives a lot less attention. What is OGNL? OGNL stands for “Object Graph Navigation Language,” which is written through Java and is used in the Apache Struts2 framework for web applications. Struts2 was originally created to build “enterprise ready web applications” and was known [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>WMI &#038; PowerShell for Offensive Security</title>
		<link>https://warroom.rsmus.com/wmi-powershell-for-offensive-security/</link>
		
		<dc:creator><![CDATA[Kevin Randall]]></dc:creator>
		<pubDate>Mon, 24 Jan 2022 17:19:50 +0000</pubDate>
				<category><![CDATA[Offense]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5602</guid>

					<description><![CDATA[As a penetration tester, learning how to use a CLI (Command Line Interface) is a necessary skill as there are many times where an interactive interface such as Remote Desktop won’t be available. Starting with a standard command prompt for Windows (cmd.exe) is a great start. However, there are more advanced and feature rich CLI [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
