<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/tag/pentest/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Thu, 15 Feb 2024 19:23:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Managed Vs. Federated Office 365: What’s the Difference?</title>
		<link>https://warroom.rsmus.com/managed-vs-federated-office-365-whats-the-difference/</link>
		
		<dc:creator><![CDATA[Ryan Shockling]]></dc:creator>
		<pubDate>Tue, 14 Mar 2023 20:20:22 +0000</pubDate>
				<category><![CDATA[Offense]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Enumeration]]></category>
		<category><![CDATA[O365]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Pentest]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5971</guid>

					<description><![CDATA[When considering the methods of attack an organization should defend itself, what comes to mind? Certainly, you should defend yourself against the most devastating forms of attack. That missing patch that leads to full domain compromise? Take care of that immediately. That password policy that means everyone uses “1234”? Should probably look at that too. [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Back to Basics: Brute Forcing Techniques</title>
		<link>https://warroom.rsmus.com/back-to-basics-brute-forcing-techniques/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Wed, 16 Nov 2022 17:07:26 +0000</pubDate>
				<category><![CDATA[Back to Basics]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[Metasploit]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5885</guid>

					<description><![CDATA[During an attack, a threat actor can often enumerate leverageable information through open-source intelligence (OSINT) gathering techniques. This can include information on users that are present on the target environment, such as usernames and email addresses. Often, a threat actor can use this information to craft a targeted list of users to facilitate a variety [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Mobile Apps &#8211; Testing WebView</title>
		<link>https://warroom.rsmus.com/mobile-apps-testing-webview/</link>
		
		<dc:creator><![CDATA[Ken Smith]]></dc:creator>
		<pubDate>Tue, 24 Nov 2020 13:00:55 +0000</pubDate>
				<category><![CDATA[Offense]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[WebView]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5308</guid>

					<description><![CDATA[Mobile application testing has progressed significantly over the past few years. Whereas the early days of mobile security were more or less a wild west, efforts such as the Mobile Top 10 and testing guide from OWASP and courses like SANS 575 have  helped to standardize both methodologies and expectations for testing. Tools like MobSF [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Quick Reference: Empire Persistence Modules</title>
		<link>https://warroom.rsmus.com/quick-reference-empire-persistence-modules/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Fri, 15 Dec 2017 14:26:22 +0000</pubDate>
				<category><![CDATA[Offense]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[Empire]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[persistence]]></category>
		<category><![CDATA[Post Exploitation]]></category>
		<category><![CDATA[PowerShell]]></category>
		<category><![CDATA[reference]]></category>
		<category><![CDATA[Tools]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=4428</guid>

					<description><![CDATA[During a penetration test you may find yourself in a situation where your foothold in the network is tenuous and you need to establish persistence. Such as when your only foothold is on a workstation, the end of day is quickly approaching, and the user may shutdown their system. In these cases you&#8217;ll likely have [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
