<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>penetration testing Archives - Threat Potential</title>
	<atom:link href="https://threatpotential.com/category/penetration-testing/feed/" rel="self" type="application/rss+xml" />
	<link>https://threatpotential.com/category/penetration-testing/</link>
	<description></description>
	<lastBuildDate>Thu, 06 Apr 2023 18:38:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Penetration Testing Frequency and Your Organization</title>
		<link>https://threatpotential.com/organization-penetration-testing-frequencypenetration-testing-frequency/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=organization-penetration-testing-frequencypenetration-testing-frequency</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Fri, 20 Jan 2023 21:07:20 +0000</pubDate>
				<category><![CDATA[awareness]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3612</guid>

					<description><![CDATA[<p>Penetration testing, also known as pen testing is a simulated cyber attack that aims to identify vulnerabilities and weaknesses in the security system. It is an important tool for organizations to assess and improve their security posture, as well as to meet regulatory and compliance requirements. But what should your penetration testing frequency be? Is...</p>
<p>The post <a href="https://threatpotential.com/organization-penetration-testing-frequencypenetration-testing-frequency/">Penetration Testing Frequency and Your Organization</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Penetration testing, also known as pen testing is a simulated cyber attack that aims to identify vulnerabilities and weaknesses in the security system. It is an important tool for organizations to assess and improve their security posture, as well as to meet regulatory and compliance requirements. But what should your penetration testing frequency be? Is once a year enough, or do you need to do it more often?</p>



<p>First, let&#8217;s clarify that there is no one-size-fits-all answer to this question, as the frequency of penetration testing depends on various factors, such as the size and complexity of your organization, the sensitivity and value of your assets, the threat landscape, and your risk appetite. However, here are some general guidelines and best practices that can help you determine the right frequency of pen testing for your organization.</p>



<h3 class="wp-block-heading">Quick penetration testing frequency guidelines</h3>



<ul class="wp-block-list" type="1">
<li>Follow industry standards and best practices: There are several industry standards and frameworks that provide recommendations on the frequency of pen testing, such as the Payment Card Industry Data Security Standard (PCI DSS), which requires annual penetration testing for merchants and service providers, and the National Institute of Standards and Technology (NIST), which recommends periodic pen testing at least every six months for critical systems. These standards and frameworks can serve as a baseline for your organization, but you should also consider your specific needs and risk profile.</li>
</ul>



<ul class="wp-block-list">
<li>Consider your risk profile and threat landscape: The frequency of pen testing should be based on the likelihood and impact of a security breach. If your organization handles sensitive and critical data, such as financial or personal information, or if you operate in a high-risk sector, such as healthcare or defense, you may want to conduct pen testing more frequently to mitigate the risks and protect your assets. On the other hand, if you have a low-risk profile and a mature security program, you may be able to reduce the frequency of pen testing without compromising your security.</li>
</ul>



<ul class="wp-block-list">
<li>Evaluate your security posture and changes: Pen testing is not a one-time event, but rather a continuous process that should be integrated into your overall security strategy. Therefore, you should not only conduct pen testing regularly, but also use the results to identify and remediate vulnerabilities, and monitor and update your security controls. You should also consider conducting pen testing after significant changes to your systems or environment, such as new deployments, updates, or acquisitions, to ensure that your security is not compromised.</li>
</ul>



<h3 class="wp-block-heading">In other words</h3>



<p>Think of pen testing as a check-up for your security. Just like you visit the doctor regularly to prevent or detect health problems, you should conduct pen testing regularly to prevent or detect security problems. If you neglect your security check-ups, you may suffer from security issues that can be costly and damaging to your organization. On the other hand, if you invest in regular security check-ups, you can proactively address vulnerabilities and maintain a strong security posture. </p>



<h3 class="wp-block-heading">Conclusion</h3>



<p>Penetration testing frequency for your organization depends on various factors, including industry standards, risk profile, threat landscape, and security posture. While annual pen testing may be sufficient for some organizations, others may need to conduct it more frequently to mitigate the risks and protect their assets.</p>



<p>If you&#8217;re looking for penetration testing services, Threat Potential would love to help you, <a href="https://threatpotential.com/contact-us/" target="_blank" rel="noreferrer noopener">contact us</a> today!</p>
<p>The post <a href="https://threatpotential.com/organization-penetration-testing-frequencypenetration-testing-frequency/">Penetration Testing Frequency and Your Organization</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Penetration Testing VS Vulnerability Scanning</title>
		<link>https://threatpotential.com/penetration-testing-vs-vulnerability-scanning/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=penetration-testing-vs-vulnerability-scanning</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Thu, 12 Jan 2023 21:47:27 +0000</pubDate>
				<category><![CDATA[awareness]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[vulnerability scanning]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3633</guid>

					<description><![CDATA[<p>Explaining the differences between vulnerability scanning and penetration testing is something that gets asked often. While both techniques are important for identifying vulnerabilities in an organization&#8217;s systems and networks, they serve different purposes and provide different levels of depth. Read on to solve the age old question of penetration testing vs vulnerability scanning. Vulnerability Scanning...</p>
<p>The post <a href="https://threatpotential.com/penetration-testing-vs-vulnerability-scanning/">Penetration Testing VS Vulnerability Scanning</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Explaining the differences between vulnerability scanning and penetration testing is something that gets asked often. While both techniques are important for identifying vulnerabilities in an organization&#8217;s systems and networks, they serve different purposes and provide different levels of depth. Read on to solve the age old question of penetration testing vs vulnerability scanning.</p>



<h3 class="wp-block-heading">Vulnerability Scanning</h3>



<p>Think of vulnerability scanning as a surface-level check-up, similar to a general physical examination at the doctor&#8217;s office. It involves using automated tools to scan a system or network for known vulnerabilities, but it does not attempt to exploit those vulnerabilities. Vulnerability scanning is a quick and cost-effective way to identify potential vulnerabilities, but it does not provide a comprehensive analysis of the system&#8217;s security.</p>



<h3 class="wp-block-heading">Penetration Testing</h3>



<p>On the other hand, penetration testing (also known as &#8220;pentesting&#8221;) is a more in-depth and hands-on approach to identifying vulnerabilities. It involves simulating a real-world cyberattack on a system or network to identify vulnerabilities and assess the organization&#8217;s overall security posture. Penetration testers use a variety of tools and techniques to identify and exploit vulnerabilities, and they provide a detailed report with recommendations for addressing those vulnerabilities.</p>



<p>So, which technique is right for your organization? It really depends on your specific needs and goals. Vulnerability scanning is a good starting point for identifying potential vulnerabilities, while penetration testing provides a more comprehensive analysis of an organization&#8217;s security posture. Both techniques are important for ensuring the security of your systems and networks, and it&#8217;s often recommended to use a combination of both. (Vulnerability scanning can help identify potential vulnerabilities, while penetration testing can help confirm and exploit those vulnerabilities.)</p>



<h3 class="wp-block-heading">Conclusion</h3>



<p>In summary, vulnerability scanning and penetration testing are both important tools for identifying vulnerabilities in an organization&#8217;s systems and networks. Vulnerability scanning is a quick and cost-effective way to identify potential vulnerabilities, while penetration testing provides a more in-depth and hands-on analysis of an organization&#8217;s security posture. No matter which technique you choose, it&#8217;s important to regularly assess the security of your systems and networks to ensure they are protected against potential cyber threats.</p>



<p>We hope this article helped you understand penetration testing vs vulnerability scanning. If you&#8217;re looking for penetration testing or vulnerability scanning services, Threat Potential would love to help you, <a href="https://threatpotential.com/contact-us/" target="_blank" rel="noreferrer noopener">contact us</a> today!</p>
<p>The post <a href="https://threatpotential.com/penetration-testing-vs-vulnerability-scanning/">Penetration Testing VS Vulnerability Scanning</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Rules of Engagement and Their Importance</title>
		<link>https://threatpotential.com/importance-of-rules-of-engagement/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=importance-of-rules-of-engagement</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Tue, 10 Jan 2023 21:41:33 +0000</pubDate>
				<category><![CDATA[awareness]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3629</guid>

					<description><![CDATA[<p>We constantly conduct penetration tests for clients to identify and address vulnerabilities in their systems. But before we begin the testing, it&#8217;s crucial to establish rules of engagement (ROE) to ensure a safe and controlled test environment. Think of an ROE as a roadmap for a penetration test. Just as a roadmap guides you to...</p>
<p>The post <a href="https://threatpotential.com/importance-of-rules-of-engagement/">Rules of Engagement and Their Importance</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>We constantly conduct penetration tests for clients to identify and address vulnerabilities in their systems. But before we begin the testing, it&#8217;s crucial to establish rules of engagement (ROE) to ensure a safe and controlled test environment.</p>



<p>Think of an ROE as a roadmap for a penetration test. Just as a roadmap guides you to your destination, rules of engagement provide guidelines and expectations for the test.</p>



<h3 class="wp-block-heading">ROE&#8217;s are important</h3>



<p>So, why are ROE&#8217;s important for a penetration test? Without clear guidelines, there is a risk of unintended consequences, such as data loss or system downtime. By establishing rules of engagement, we can ensure that the test is conducted in a controlled and ethical manner. This is not only great for the client organization but also the testing organization.</p>



<h3 class="wp-block-heading">Key elements</h3>



<p>Here are a few key elements to consider when establishing ROE&#8217;s for a penetration test:</p>



<ul class="wp-block-list" type="1">
<li>Scope of the test: This should outline the specific systems and assets that will be tested, as well as any exclusions.</li>



<li>Test methods and tools: This should specify the methods and tools that will be used during the test, as well as any restrictions.</li>



<li>Communication and reporting: This should outline the communication channels and reporting process for the test.</li>



<li>Termination of the test: This should specify the conditions under which the test will be terminated, such as if any critical vulnerabilities are identified or indicators of a previous or on-going compromise exist.</li>
</ul>



<h3 class="wp-block-heading">Conclusion</h3>



<p>The rules of engagement document is a crucial part of any penetration test. They provide a clear understanding of the test parameters and help ensure a safe and controlled testing environment. Don&#8217;t risk unintended consequences – establish clear rules of engagement for your penetration test. This could be the determining factor between a successful testing experience and a failure with costly ramifications.</p>



<p>If you&#8217;re looking for penetration testing services, Threat Potential would love to help you, <a href="https://threatpotential.com/contact-us/" target="_blank" rel="noreferrer noopener">contact us</a> today!</p>
<p>The post <a href="https://threatpotential.com/importance-of-rules-of-engagement/">Rules of Engagement and Their Importance</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>External VS Internal Pen Test &#8211; How to choose with a limited budget</title>
		<link>https://threatpotential.com/external-vs-internal-pen-test-how-to-choose-with-a-limited-budget/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=external-vs-internal-pen-test-how-to-choose-with-a-limited-budget</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Tue, 27 Dec 2022 20:58:30 +0000</pubDate>
				<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[vulnerability scanning]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3606</guid>

					<description><![CDATA[<p>As a business owner, it is important to regularly assess the security of your network and systems. One way to do this is by conducting a penetration test, which simulates a cyber-attack to identify vulnerabilities and weaknesses. However, with a limited budget, you may be wondering whether to choose an external or internal penetration test....</p>
<p>The post <a href="https://threatpotential.com/external-vs-internal-pen-test-how-to-choose-with-a-limited-budget/">External VS Internal Pen Test &#8211; How to choose with a limited budget</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>As a business owner, it is important to regularly assess the security of your network and systems. One way to do this is by conducting a penetration test, which simulates a cyber-attack to identify vulnerabilities and weaknesses. However, with a limited budget, you may be wondering whether to choose an external or internal penetration test.</p>



<p>An external penetration test simulates an attack from outside the organization&#8217;s network, mimicking the actions of an external hacker. This test focuses on the security of the organization&#8217;s internet-facing assets, such as websites, web applications, and cloud services.</p>



<p>On the other hand, an internal penetration test simulates an attack from within the organization&#8217;s network, such as from an employee or contractor. This test focuses on the security of the organization&#8217;s internal systems and infrastructure, including servers, workstations, and network devices.</p>



<p>So, how do you choose between an external and internal penetration test with a limited budget? Here are some factors to consider:</p>



<ul class="wp-block-list" type="1">
<li>Scope of the test: If your organization&#8217;s main concern is the security of its internet-facing assets, an external penetration test may be more appropriate. However, if you want to assess the overall security of your internal network, an internal test may be more comprehensive.</li>
</ul>



<ul class="wp-block-list">
<li>Threats and risks: Consider the specific threats and risks that your organization faces. For example, if you have a large number of external clients or partners, an external test may be more relevant. On the other hand, if you have a high turnover rate or a large number of contractors, an internal test may be more appropriate.</li>
</ul>



<ul class="wp-block-list">
<li>Regulations and compliance: Some industries, such as healthcare and finance, have strict regulations and compliance requirements that mandate specific types of penetration testing. Make sure to check the requirements for your industry and consider them when making your decision.</li>
</ul>



<p>Ultimately, the choice between an external and internal penetration test will depend on your specific security needs and budget. It may be helpful to consult with a security expert to determine the best approach for your organization</p>
<p>The post <a href="https://threatpotential.com/external-vs-internal-pen-test-how-to-choose-with-a-limited-budget/">External VS Internal Pen Test &#8211; How to choose with a limited budget</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Often to Test</title>
		<link>https://threatpotential.com/how-often-to-test/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-often-to-test</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Sun, 14 Aug 2022 14:45:00 +0000</pubDate>
				<category><![CDATA[hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3470</guid>

					<description><![CDATA[<p>In today’s world, massive data breaches and sophisticated malware litter news headlines. So much that it feels as though it’s more of when your organization will fall victim rather than if. Still, many organizations choose to only meet baseline compliance requirements and seldom perform penetration testing. Sometimes just being “good”, isn’t “good enough”. Not conducting...</p>
<p>The post <a href="https://threatpotential.com/how-often-to-test/">How Often to Test</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In today’s world, massive data breaches and sophisticated
malware litter news headlines. So much that it feels as though it’s more of
when your organization will fall victim rather than if. Still, many
organizations choose to only meet baseline compliance requirements and seldom
perform penetration testing. Sometimes just being “good”, isn’t “good enough”.
Not conducting preemptive security assessments is a recipe for disaster, but
how often is enough?</p>



<p>Most authorities will say that you should test before placing
a system or software into production and after any major change. We all agree
those are key milestones that should trigger security testing in any IT risk
management program but there’s more to it than that. It’s less about how often
you should test but more about a continuous conversation about the
ever-changing attacker landscape, your organizations risk appetite, and general
forward thinking.</p>



<h4 class="wp-block-heading"><strong>Attacker Landscape</strong> </h4>



<p>You understand what’s valuable in your organization, unfortunately attackers do too. Attackers can range from rogue employees to criminal empires, so understanding the threats against you is a critical component to your testing regimen and pace. Researching current security trends and the associated threat actor’s behavior can give you a clue as to the depth and frequency of testing required.</p>



<h4 class="wp-block-heading"><strong>Risk Appetite</strong></h4>



<p>As the saying goes, “just enough security is the right amount of security”. It doesn’t make good business sense to spend more on a security control than what you are securing. Strive to put controls in places that give you the most bang for your buck. Keep in mind that risk in general can never be completely eliminated but you can take measures to drastically reduce the impact or likelihood of an attack. Taking a defense in depth approach to protect your most valuable assets is a great starting point and a best practice.</p>



<h4 class="wp-block-heading"><strong>Forward Thinking</strong></h4>



<p>Key business endeavors can often create new attack vectors and invite threat actors you didn’t anticipate. Does your organization plan to acquire another business, move into a new industry, or on the verge of an R&amp;D breakthrough? Knowing where your organization is headed can better prepare you by creating a solid foundation for your security program.</p>



<p>Regrettably risk management isn’t a set it and forget it
activity and testing cadence is made up of a culmination of decisions.
Continuous conversation and review may be what keeps your organization’s brand
out of the notorious section of the news tomorrow.</p>
<p>The post <a href="https://threatpotential.com/how-often-to-test/">How Often to Test</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Top 6 ways to improve your penetration test results</title>
		<link>https://threatpotential.com/top-6-ways-to-improve-your-penetration-test-results/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-6-ways-to-improve-your-penetration-test-results</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Thu, 07 Jul 2022 15:07:43 +0000</pubDate>
				<category><![CDATA[MFA]]></category>
		<category><![CDATA[password attacks]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3432</guid>

					<description><![CDATA[<p>Maybe you’re thinking of having a penetration test completed or simply have the jitters of not knowing how the test results will turn out. We get this question often and we’re here to help prepare you for success. So take a look at the top 6 ways to improve your penetration test results. Patch Configuration...</p>
<p>The post <a href="https://threatpotential.com/top-6-ways-to-improve-your-penetration-test-results/">Top 6 ways to improve your penetration test results</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Maybe you’re thinking of having a penetration test completed or simply have the jitters of not knowing how the test results will turn out. We get this question often and we’re here to help prepare you for success. So take a look at the top 6 ways to improve your penetration test results.</p>



<h3 class="wp-block-heading"><strong>Patch</strong></h3>



<p>Configuration management can be difficult but ensure that you know what
exists on your network, remove what you don’t need, and that security patches
have been applied. Applying security patches is imperative to the overall
health of your network and the data that’s held within. However, a
vulnerability scan will do a couple of things for you, inventory the items in
scope and discover common vulnerabilities. Due to the success rate that
outdated versions bring, this is usually an attacker’s first stop.</p>



<h3 class="wp-block-heading"><strong>Change default credentials</strong></h3>



<p>As a penetration tester, attempting default credentials to any system
that we come across is second nature. Failure to change default credentials is
often attributed to simply setting the system up and merely forgetting to
change it afterwards. This is where you can implement some rigor around
processes such as utilizing hardening checklists. Anytime a project,
application, or system is introduced into your environment, you should ensure a
hardening checklist is incorporated in the plan. Often applications and
appliances have more than just one default account so make sure not to forget
those as well.</p>



<h3 class="wp-block-heading"><strong>Implement a password filter</strong></h3>



<p>Password spraying has become a common way to infiltrate organizations. Having
a 10-character minimum, mixed case, numbers, and special character sounds
decent right? Well “Password123!”, “Spring2020!”, “YourCompanyName2020!”
satisfy the requirements but doesn’t reduce the likelihood of an attacker
guessing those credentials. If you force users to rotate their password often
then they are more likely to fall into this trap of using seasons, years, or
simply incrementing numbers to keep up with their password. Be sure to utilize
a tool that will blacklist these type passwords. Don’t forget to not allow them
to use part of their name or username as a password as well!</p>



<h3 class="wp-block-heading"><strong>Implement MFA</strong></h3>



<p>As with anything, multi-factor authentication is not a “hacker proof” solution. However, it does limit a significant number of attacks and increases your overall security posture. The good news is that the MFA realm has become commonplace in most applications and the implementation of those solutions have improved dramatically over the last couple of years. It’s important that you test these as backup options and some weak secondary factors can be easily circumvented. Check out <a href="https://threatpotential.com/mfa-and-your-small-business/">MFA and your business</a> to learn more.</p>



<h3 class="wp-block-heading"><strong>Have separate administrative accounts</strong></h3>



<p>I’ve found that practicing least privilege is seldom found during
penetration testing. However, it has led to a significant amount of domain
takeovers and one of the big eye-openers that our clients often see. Any
administrators in your domain should have separate accounts, one to perform
administrative duties and one as their regular user account. The accounts
should always have separate passwords and the administrative account should
have additional security features applied such as password length, complexity,
and additional monitoring.</p>



<h3 class="wp-block-heading"><strong>Have unique local administrator accounts</strong></h3>



<p>Once an attacker has landed on a machine it’s usually trivial to obtain local passwords or to perform privilege escalation. If your organization is using the same local administrator credential on all your machines, then it makes for moving laterally in your network extremely easy. Doing this manually would be over burdensome for many but luckily there’s a more automated solution and best of all it’s free! Microsoft came out with Local Administrator Password Solution (<a href="https://www.microsoft.com/en-us/download/details.aspx?id=46899">LAPS</a>) to assist in rectification of this issue. It essentially automates the process of changing the passwords for every local administrator account and stores it for you.</p>



<h3 class="wp-block-heading"><strong>Summary</strong></h3>



<p>The goal of your penetration test is to measure the security of your organization and provide actionable steps towards improvement. Even if you don&#8217;t get a sterling report back, it&#8217;s much more important to know what your risks are. Comment below and let us know how you improve your penetration test results!</p>
<p>The post <a href="https://threatpotential.com/top-6-ways-to-improve-your-penetration-test-results/">Top 6 ways to improve your penetration test results</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
