<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									informativethicalhacking Forum - Recent Posts				            </title>
            <link>https://informativethicalhacking.com/community/</link>
            <description>informativethicalhacking Discussion Board</description>
            <language>en-US</language>
            <lastBuildDate>Wed, 06 May 2026 13:22:39 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>RE: Hacking a Network</title>
                        <link>https://informativethicalhacking.com/community/main-forum/hacking-a-network/#post-5</link>
                        <pubDate>Thu, 06 Mar 2025 06:08:27 +0000</pubDate>
                        <description><![CDATA[I believe that hacking using KaliLinux is mostly efficient and letting us trying on how to find an open port.  This is from my perspective!!]]></description>
                        <content:encoded><![CDATA[<p>I believe that hacking using KaliLinux is mostly efficient and letting us trying on how to find an open port.  This is from my perspective!! </p>]]></content:encoded>
						                            <category domain="https://informativethicalhacking.com/community/"></category>                        <dc:creator>hanan.almubarak</dc:creator>
                        <guid isPermaLink="true">https://informativethicalhacking.com/community/main-forum/hacking-a-network/#post-5</guid>
                    </item>
				                    <item>
                        <title>Hacking a Network</title>
                        <link>https://informativethicalhacking.com/community/main-forum/hacking-a-network/#post-4</link>
                        <pubDate>Thu, 06 Mar 2025 06:07:06 +0000</pubDate>
                        <description><![CDATA[What are the possible hacking tools and techniques that are mostly used to hack a network?]]></description>
                        <content:encoded><![CDATA[<p>What are the possible hacking tools and techniques that are mostly used to hack a network?</p>]]></content:encoded>
						                            <category domain="https://informativethicalhacking.com/community/"></category>                        <dc:creator>hanan.almubarak</dc:creator>
                        <guid isPermaLink="true">https://informativethicalhacking.com/community/main-forum/hacking-a-network/#post-4</guid>
                    </item>
				                    <item>
                        <title>Gray Hat Hacking Activities</title>
                        <link>https://informativethicalhacking.com/community/main-forum/gray-hat-hacking-activities/#post-3</link>
                        <pubDate>Wed, 05 Mar 2025 08:34:08 +0000</pubDate>
                        <description><![CDATA[Discuss the gray hat hacking activities]]></description>
                        <content:encoded><![CDATA[<p>Discuss the gray hat hacking activities</p>]]></content:encoded>
						                            <category domain="https://informativethicalhacking.com/community/"></category>                        <dc:creator>hanan.almubarak</dc:creator>
                        <guid isPermaLink="true">https://informativethicalhacking.com/community/main-forum/gray-hat-hacking-activities/#post-3</guid>
                    </item>
				                    <item>
                        <title>White Hat Hacking Activities</title>
                        <link>https://informativethicalhacking.com/community/main-forum/white-hat-hacking-activities/#post-2</link>
                        <pubDate>Wed, 05 Mar 2025 08:33:24 +0000</pubDate>
                        <description><![CDATA[Discuss the white hat hacking activities]]></description>
                        <content:encoded><![CDATA[<p>Discuss the white hat hacking activities</p>]]></content:encoded>
						                            <category domain="https://informativethicalhacking.com/community/"></category>                        <dc:creator>hanan.almubarak</dc:creator>
                        <guid isPermaLink="true">https://informativethicalhacking.com/community/main-forum/white-hat-hacking-activities/#post-2</guid>
                    </item>
				                    <item>
                        <title>Black Hat Hacking Activities</title>
                        <link>https://informativethicalhacking.com/community/main-forum/black-hat-hacking-activities/#post-1</link>
                        <pubDate>Wed, 05 Mar 2025 08:31:52 +0000</pubDate>
                        <description><![CDATA[Discuss the black hat hacking activities]]></description>
                        <content:encoded><![CDATA[<p>Discuss the black hat hacking activities</p>]]></content:encoded>
						                            <category domain="https://informativethicalhacking.com/community/"></category>                        <dc:creator>hanan.almubarak</dc:creator>
                        <guid isPermaLink="true">https://informativethicalhacking.com/community/main-forum/black-hat-hacking-activities/#post-1</guid>
                    </item>
							        </channel>
        </rss>
		