<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/category/rd/research/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Thu, 15 Feb 2024 19:23:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Building a Vulnerable Box: RemoteMouse</title>
		<link>https://warroom.rsmus.com/building-a-vulnerable-box-remotemouse/</link>
		
		<dc:creator><![CDATA[Ken Smith]]></dc:creator>
		<pubDate>Fri, 29 Jan 2021 19:14:36 +0000</pubDate>
				<category><![CDATA[Offense]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5379</guid>

					<description><![CDATA[At the start of every year, I review my lab repository of intentionally vulnerable machines and do my best to add new ones to the list. I recently came across a particularly interesting flaw, from a teaching perspective, and thought it would be worth capturing. RemoteMouse is Windows/Linux/Mac compatible software that can be used in [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>2020 Attack Vectors Report &#8211; Internal Pentesting</title>
		<link>https://warroom.rsmus.com/2020-attack-vectors-report-internal-pentesting/</link>
		
		<dc:creator><![CDATA[Ken Smith]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 21:49:52 +0000</pubDate>
				<category><![CDATA[Offense]]></category>
		<category><![CDATA[R&D]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5305</guid>

					<description><![CDATA[Our team has collected two years worth of internal penetration testing data to put together a white paper covering our most frequent footholds that lead to full network compromises. The data clearly shows that passwords and patching continue to be a significant problem. Nearly half of all compromises achieved by RSM&#8217;s testing team between 2018 [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Distributed Security: Advancements in IT Governance using Multi-Party Computation (MPC)</title>
		<link>https://warroom.rsmus.com/distributed-security-advancements-in-it-governance-using-multi-party-compuation-mpc/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Wed, 16 Sep 2020 11:56:00 +0000</pubDate>
				<category><![CDATA[R&D]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5266</guid>

					<description><![CDATA[Imagine never having to remember a password again. To some this might sound crazy, but by combining time-tested cryptography and new technological advancements, this far-fetched proposition is possible. Multi-party computation (MPC) protocols allow users to eliminate the need to remember passwords and potentially much more while simultaneously enhancing data security. MPC works by distributing parts [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>SAP RECON CVE-2020-6287</title>
		<link>https://warroom.rsmus.com/sap-recon-cve-2020-6287/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Fri, 24 Jul 2020 00:50:24 +0000</pubDate>
				<category><![CDATA[R&D]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[pentesting]]></category>
		<category><![CDATA[SAP]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5199</guid>

					<description><![CDATA[On July 13, 2020, SAP software released a patch impacting the SAP NetWeaver Application Server Java versions 7.5 and earlier. The vulnerability dubbed RECON (Remotely Exploitable Code on NetWeaver) Specifically targets SAP NetWeaver Java while Advanced Business Application Programming (ABAP) stack systems remain unaffected. This vulnerability is operating system (OS) and database independent, meaning regardless [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
