<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.somersetrecon.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-08-23</lastmod>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2024/automated-bug-hunting-with-semgrep</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-26</lastmod>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2024/6/5/reversing-the-unicorn</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-14</lastmod>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2022/hacking-the-furbo-dog-camera-part-iii</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-12-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/95af2f6b-c171-4939-9e96-065639349a08/image2.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part III Fun with Firmware - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/205b39b0-47c1-412c-9a2d-c62d71937563/image6.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part III Fun with Firmware - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/bfa1c2a8-6646-42b0-bf05-c8828d6c6ab3/image14.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part III Fun with Firmware - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/e987a2c7-933c-4ec8-8651-7ce017e11143/image7.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part III Fun with Firmware - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/ecaa6ce2-e75f-4ae1-8bd7-3264ed5f3277/image5.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part III Fun with Firmware - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/9eb1a4e9-5832-4c05-93cc-551faa65440d/image1.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part III Fun with Firmware - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/6d3c1662-0b2f-4062-9951-6aa020e16e83/image11.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part III Fun with Firmware - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/6711b910-7804-4cd6-8a4c-24c4ebfbc33a/image15.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part III Fun with Firmware - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/5688d311-3017-469c-ad55-dea8e6edf8d9/image9.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part III Fun with Firmware - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/4c0581dc-1bae-4d78-981b-dd9d6b8f123f/image13.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part III Fun with Firmware - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/74d7ccd8-14d2-41b4-ad6d-48132325ce1f/image10.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part III Fun with Firmware - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/fuzzing-for-cves-part-i-local-targets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/6c6a56a9-2293-4539-96f9-544ba003e1c6/Screen+Shot+2022-10-13+at+1.41.19+PM.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/19a78326-cd02-41f4-8faf-419240c41ee0/my_c.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/12b7d422-b1c4-4cd6-9853-c280150018d3/Screen-Shot-2022-06-30-at-4.37.18-PM.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/40105a0b-5b25-4a4b-bcea-cc73de8eea71/aflpp_bg-768x769_1_50.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/75f3e228-df45-4334-b8a9-90567e319556/afl_plus_plus_install_kali.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/55b30fdf-5b56-419d-be44-db316519bf02/md2roff_compile_AFL.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/81883052-c70d-4dc0-801d-f89104340890/mkdir_input_output.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/cc4d2f88-db9c-4bbb-b061-968f216adb0e/afl_sample_input-1.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/5cca5449-3c53-4f19-a434-50ffc9e19ac8/start_afl.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/ffcd0a71-261d-4504-b2fc-261ca9e7a45c/afl-fuzz.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/cfa4dfd8-cd1c-4575-accb-a5d881bd552f/Screen-Shot-2022-06-30-at-5.55.04-PM.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/e0aac333-fe40-426c-b68c-fc5a57d7ad4b/Screen-Shot-2022-06-30-at-5.55.43-PM.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/6aae300e-ee31-4f2e-8588-af3be1ae46ec/vuln_md_file.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/8f3f7359-1377-4bad-ba71-0806d7024ace/segfault.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/186a1445-2bd7-4316-9686-617204e344f8/gdb_registers.png</image:loc>
      <image:title>Blog - Fuzzing for CVEs Part I (Local Targets) - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2021/hacking-the-furbo-dog-camera-part-ii</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-10-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1630603797341-BCJ6DTIEK9V6VX1ITPAU/nmap_results.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part II - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1630604753579-55EGI5H38KKBOEZ0NQYP/stickers_combo.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part II - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1631562650227-1TWS54OU0H2AW8S2AXTY/furbo.jpg</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part II - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1630605616198-N3E8RBGGBFR2FRQ1YZXN/teardown_assembled.jpg</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part II - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1630606730450-2E7SPSKPWRVF9AL1CYGW/2.5t_auth_dialog.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part II - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1630607109503-CQR0ID27WCJAQ8DLNGU0/modify_realm.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part II - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1630607180892-XFTB40FCBJ1IUXQ005FT/Screen+Shot+2021-05-05+at+2.06.19+PM.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part II - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1630607213642-PMYLEBTTON7L103TFPKF/ambarella_http_ldc.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part II - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1630609014794-JDBUFRPQ0D13IBW2SUNM/normal_req.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part II - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1630609039567-9HWISOFGR9ZD95IEXI6S/normal_resp.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part II - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1630609071853-KPUEVUA1G56LXXXKRRBV/cmd_inj_req.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part II - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1630609090089-6ETHYES4UKQNUU23C21H/cmd_inj_response.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part II - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1630611049767-6KS6UYWDKPTSHN3Y5PH0/cmd_inj_ghidra.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part II - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2021/hacking-the-furbo-part-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-04-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1618444994807-2H8B1OWU3S4NDEF49NC9/DSC_0773.JPG</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part I</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1618446490073-AGOJQCB8J1WSQMQAP5GZ/DSC_0550.jpg</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part I</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1618447461579-AOCK80Q38IIBRGWBYIPD/DSC_0592_brighter.jpg</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part I</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1618448455486-XRGF1229ZAL1OLUOQW4L/DSC_0577.jpg</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part I</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1618448562010-Q36MIJSIPJFIJN4XLGBH/DSC_0583.jpg</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part I</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1618450140952-FM4ELVLO1G1L4JPERBYN/DSC_0583_lines.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part I</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1618453175802-AOI92SY1F6WNXCSK2KO7/500_As_gdb.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part I</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1618453452414-T3DR64XXBX7MSAJHAGGQ/bo_watin_for_shellz.JPG</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part I</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1618454595926-ZIIFYWNZT74VWMUJGAKV/aslr_shell.png</image:loc>
      <image:title>Blog - Hacking the Furbo Dog Camera: Part I</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2019/8/5/layerone-2019-ctf-log-viewer</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-08-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565054547957-89KRH5O0ZQGLM3N2PBAC/image7.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565128530504-UXJTGAWQQIYP1Y506ISM/image14.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565128651994-ZHO15BFIUC6MD1K9Y5Q9/image1.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565128793877-EI0M190B88ZQYFF3MFYQ/image5.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565132323234-7OQDQS80OZV2DZ1H2M1N/image11.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565132373518-MX24IZBGSRT9UZI4X4IY/image-asset.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565132394131-9JOQJYR0D4N7Y8VSAFUI/image-asset.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565191658642-TDYY23193FIESJ1SMG19/image2.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565191702687-0BJ5KUJUFTQ1Q27V9P2T/image10.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565191744287-UOFDA41X395V27QVXR9S/image-asset.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565191817376-K300GI6G6K8PXXLUFUOO/image-asset.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565193416201-Z3RHPU5XFH3T8ZGM8NH4/image-asset.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565193461295-I68KZC8PNA1IF4LRINZW/image-asset.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565193553505-XAVTSW4V3FBDHNAFKJH4/image-asset.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565193651300-VEAP51QIEMPW9Q8KWZGX/image-asset.png</image:loc>
      <image:title>Blog - LayerOne 2019 CTF - LogViewer</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2019/ghidra-plugin-development-for-vulnerability-research-part-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-08-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1554153375763-894GHUISYKN43KKGD718/image-asset.gif</image:loc>
      <image:title>Blog - Ghidra Plugin Development for Vulnerability Research - Part-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1554154177487-KO61ARHUDH1MI5AM6AEQ/image-asset.gif</image:loc>
      <image:title>Blog - Ghidra Plugin Development for Vulnerability Research - Part-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1554154655281-ONSHXI9DA4S5VLTAHOGJ/image-asset.gif</image:loc>
      <image:title>Blog - Ghidra Plugin Development for Vulnerability Research - Part-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1554155685053-HJMDFJ2U2V7KERPY1EAB/ghidra_output4.png</image:loc>
      <image:title>Blog - Ghidra Plugin Development for Vulnerability Research - Part-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1554155536446-COL0DKS6EXYFC3ZN93K8/image-asset.gif</image:loc>
      <image:title>Blog - Ghidra Plugin Development for Vulnerability Research - Part-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1554155764255-44AM1UDHK5OINH2WQQYI/ghidra_output6.png</image:loc>
      <image:title>Blog - Ghidra Plugin Development for Vulnerability Research - Part-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1554155826476-DCDCS5YIJ4JD76BJWHU6/ghidra_output7.png</image:loc>
      <image:title>Blog - Ghidra Plugin Development for Vulnerability Research - Part-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1554155953691-F524GFA87ZMYC0FQIONX/ghidra_output8.png</image:loc>
      <image:title>Blog - Ghidra Plugin Development for Vulnerability Research - Part-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1554443873267-YEITLQMU8Y53PJ1445WK/ghidra_output9.png</image:loc>
      <image:title>Blog - Ghidra Plugin Development for Vulnerability Research - Part-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1554156116646-DZDOWP8SRLUO8J7C6Y8E/ghidra_output9.png</image:loc>
      <image:title>Blog - Ghidra Plugin Development for Vulnerability Research - Part-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1554156205095-JTQUAMAA5TK30R9K1M28/ghidra_output10.png</image:loc>
      <image:title>Blog - Ghidra Plugin Development for Vulnerability Research - Part-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1554320077275-VA5CR62LWJDND71JR32R/ghidra_output15.png</image:loc>
      <image:title>Blog - Ghidra Plugin Development for Vulnerability Research - Part-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1554156281322-7OTS5UWS7QUP7KXJ17YF/ghidra_output11.png</image:loc>
      <image:title>Blog - Ghidra Plugin Development for Vulnerability Research - Part-1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1565995069082-PPSVF1MQ5D0O0GGKKGHV/ghidra_output12.png</image:loc>
      <image:title>Blog - Ghidra Plugin Development for Vulnerability Research - Part-1</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2018/8/2/idapython-part-2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-11-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1533230452771-9F96PZR471CINHYH6QXJ/blog_1.png</image:loc>
      <image:title>Blog - Introduction to IDAPython for Vulnerability Hunting - Part 2</image:title>
      <image:caption>Example of inlined strcpy() - Disassembly on left, HexRays decompiled version on right</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1533230410558-ITM1PUMS9944LVZ3AH7J/blog_2.png</image:loc>
      <image:title>Blog - Introduction to IDAPython for Vulnerability Hunting - Part 2</image:title>
      <image:caption>Output of Script Against EQNEDT32.exe</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2018/7/27/infecting-the-embedded-supply-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1532704637868-PBXQ5YBYQNQLD8B729BG/blog_1.png</image:loc>
      <image:title>Blog - Infecting the Embedded Supply Chain</image:title>
      <image:caption>Format String Vulnerability Demonstration</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1532704710257-LZKOUROOWCFFUB5M6HLP/blog_2.png</image:loc>
      <image:title>Blog - Infecting the Embedded Supply Chain</image:title>
      <image:caption>Hex-Rays Output of the Source of the Vulnerability</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1532704798560-XUBP7WVFFKVEQ1965IY3/blog_3.png</image:loc>
      <image:title>Blog - Infecting the Embedded Supply Chain</image:title>
      <image:caption>Exception Thrown when Reading Memory "AAAA"</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1532704895677-LTBX0O2ZW284V6ILMY90/blog_4.png</image:loc>
      <image:title>Blog - Infecting the Embedded Supply Chain</image:title>
      <image:caption>Hex-Rays Output Showing the Creation of a Telnet Server Thread</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1533327983074-7YRFUQICHHRL9XJXQCIL/j_link_serial_number.jpg</image:loc>
      <image:title>Blog - Infecting the Embedded Supply Chain</image:title>
      <image:caption>Segger Serial Number Divided into Sections</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2018/7/25/game-hacking-hammerwatch-invincibility</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1532551366005-TIC4HTCM9C6I40KQUCSR/blog_image_2.png</image:loc>
      <image:title>Blog - Game Hacking: Hammerwatch Invincibility</image:title>
      <image:caption>Dnspy Provides the Full Decompiled Source</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1532551540053-7F9PD8WC9L469OYPRU2Y/blog_image_3.gif</image:loc>
      <image:title>Blog - Game Hacking: Hammerwatch Invincibility</image:title>
      <image:caption>Invincibility Cheat in Effect. Left-side is what the cheater sees, and the Right-side is what the other players see</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1532551649163-GIJKBH05BSEHJA5PL8OH/blog_image_4.gif</image:loc>
      <image:title>Blog - Game Hacking: Hammerwatch Invincibility</image:title>
      <image:caption>RainingDeath Custom Attack in Effect - Left-side is what the cheater sees, Right-side is what the other players see</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1532551183764-T2E0NN7XBPTPEM0AC8BG/image_1.gif</image:loc>
      <image:title>Blog - Game Hacking: Hammerwatch Invincibility</image:title>
      <image:caption>The End Result: Playing Hammerwatch using Invincibility Mode, Unlimited Mana Mode, and a Custom Multi-Arrow Spin Attack</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2018/7/6/introduction-to-idapython-for-vulnerability-hunting</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-07-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1530919824456-J9VEZP9JXLP5CNXRQEW3/vrblog_fig1_get_func_names.png</image:loc>
      <image:title>Blog - Introduction to IDAPython for Vulnerability Hunting</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1530920915955-8I2KHL9XD16Y77M2ZQ1L/vrblog_fig2_strcpy_calls.png</image:loc>
      <image:title>Blog - Introduction to IDAPython for Vulnerability Hunting</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1530920996839-G9PFEGTSL25HT80PJJKH/vrblog_fig3_function_call.png</image:loc>
      <image:title>Blog - Introduction to IDAPython for Vulnerability Hunting</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1530921803226-5ZOFTKO5IXVFLUAVONNJ/vrblog_fig4_output.png</image:loc>
      <image:title>Blog - Introduction to IDAPython for Vulnerability Hunting</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2018/5/2/gameon-competition-and-abusing-scada-hmi-project-files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-02</lastmod>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2016/10/14/electronic-safe-lock-analysis-part-2-</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-12-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1480635627918-JF0A5MM2NL68FLMSRXP7/image-asset.png</image:loc>
      <image:title>Blog - Electronic Safe Lock Analysis: Part 2</image:title>
      <image:caption>Figure 1: Wireshark capturing Bluetooth traffic with wardriving filter</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1480635830270-01KK45XZSHZP5S6QKYGZ/image-asset.png</image:loc>
      <image:title>Blog - Electronic Safe Lock Analysis: Part 2</image:title>
      <image:caption>Figure 2: Bluetooth application payload containing the receiver MAC address (pink), sender MAC address (cyan), PIN (green), and open time (blue)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1480635871000-ZS5APDHF7CDVRKEZAKWK/image-asset.png</image:loc>
      <image:title>Blog - Electronic Safe Lock Analysis: Part 2</image:title>
      <image:caption>Figure 3: PIN in hexadecimal format</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2016/6/7/electronic-safe-lock-analysis-part-1-teardown</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-06-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1465337871864-DKH9XF0CQ5JMAS0S5KY4/image-asset.jpeg</image:loc>
      <image:title>Blog - Electronic Safe Lock Analysis: Part 1 - Teardown</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1465323695410-3XYYEF5M3IEHR01LPH6K/image-asset.jpeg</image:loc>
      <image:title>Blog - Electronic Safe Lock Analysis: Part 1 - Teardown</image:title>
      <image:caption>Front side of the entry pad circuit board shows power connections for a 9V battery and a 10-pin debugging interface (J1).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1465324097537-O5BKH03VM4D70L8PGK0N/image-asset.jpeg</image:loc>
      <image:title>Blog - Electronic Safe Lock Analysis: Part 1 - Teardown</image:title>
      <image:caption>Back side of the entry pad is where the board’s main MCU, a Renesas μPD78F0515A (U1), can be found. It’s accompanied with an NXP QN902X SoC (U6) for BLE communication. Peripherals, such as the 8-pin keypad header (P1) and 4-pin serial interface (P3; ref above) to the lock-body are also located on this side. This serial interface is both used for communication and to carry power to the lock body. There are unpopulated footprints (U2, U4, BAT1), which may have been used in previous revisions of this board, for debugging purposes, or other models of this entry pad.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1465324238498-2IQM5Z9LDCA0VDHTXB5Q/image-asset.jpeg</image:loc>
      <image:title>Blog - Electronic Safe Lock Analysis: Part 1 - Teardown</image:title>
      <image:caption>Front side of the lock body circuit board uses a less featureful Renesas μPD78F9234 MCU (U1). It is only known to communicate with a entry pad over the wired 4-pin serial communication interface (JP1), but there is another serial interface (JP2) adjacent to it that is hidden by the lock body cover. Additionally hidden is a 2-pin connector (P1) that is tied to pin 14 on the MCU. Its purpose is still undetermined.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1465324429747-JQ0DG1TO8NO7HGDXA9D5/image-asset.jpeg</image:loc>
      <image:title>Blog - Electronic Safe Lock Analysis: Part 1 - Teardown</image:title>
      <image:caption>Back side of the lock body reveals another 8-pin debugging interface (J1; under sticker) and the hardware reset button (SW1). The reset button allows the lock body and entry pad to “relink” if the devices were to somehow fall out of sync with each other. The reset button is also used when connecting a preconfigured lock body with a new entry pad.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1465324535365-H0L8U001GSIFMVSI5GM7/image-asset.jpeg</image:loc>
      <image:title>Blog - Electronic Safe Lock Analysis: Part 1 - Teardown</image:title>
      <image:caption>The lock body is the only mechanical part of the system. It is composed of a DC motor and bolt. If 5 volts is applied across the red and yellow wires shown, the DC motor will retract the bolt and allow the security container to be opened.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2016/1/21/hello-barbie-security-part-2-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-01-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1453416368467-H8HMIJAGAQ600XDLN6AR/image-asset.png</image:loc>
      <image:title>Blog - Hello Barbie Security: Part 2 - Analysis</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1453416426692-1RENPEFKA259EVPUUWO6/image-asset.png</image:loc>
      <image:title>Blog - Hello Barbie Security: Part 2 - Analysis</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/2015/11/20/hello-barbie-security-part-1-teardown</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-11-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1448058902622-YNSOINIKZ2S3VPBBTBZ7/image-asset.jpeg</image:loc>
      <image:title>Blog - Hello Barbie Security: Part 1 - Teardown</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1448059099036-L1T68FGQO62QBPR8BGG0/image-asset.jpeg</image:loc>
      <image:title>Blog - Hello Barbie Security: Part 1 - Teardown</image:title>
      <image:caption>Hello Barbie main circuit board. Front side. Showing Wi-Fi module, flash memory, audio codec, and debugging headers.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1448059139546-14BP22NYD8AQ1B0MML2P/image-asset.jpeg</image:loc>
      <image:title>Blog - Hello Barbie Security: Part 1 - Teardown</image:title>
      <image:caption>Hello Barbie main circuit board. Back side. Showing LEDs, test points, and main button.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1448059741836-40XKV9WSOSSP3IRTOGGQ/image-asset.png</image:loc>
      <image:title>Blog - Hello Barbie Security: Part 1 - Teardown</image:title>
      <image:caption>Screenshot of firmware being dumped from Barbie's flash memory.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/Barbie</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/IDA+Pro</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/IDA</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/AFL</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/Firmware+Exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/IDAPython</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/CVE-2022-36752</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/Reverse+Engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/Furbo+Update+MiTM</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/Zero-Day</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/IoT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/Vulnerability+Analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/CVE-2022-34913</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/Keurig</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/Hardware+Hacking</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/CVE-2022-34556</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/Teardown</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/Hello+Barbie</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/Fuzzing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/Ghidra</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/CVE-2022-41220</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/Semgrep</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/blog/tag/Plugin</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2016-01-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1415297928596-WBZ6W5LW7SRV88S73VPI/image-asset.jpeg</image:loc>
      <image:title>Home</image:title>
      <image:caption>Photo by Nirian/iStock / Getty Images</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1415298035990-S2PADFGJX9BGMKYL0PCR/image-asset.jpeg</image:loc>
      <image:title>Home</image:title>
      <image:caption>Photo by Miha Peroša/iStock / Getty Images</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1415298153992-CLH3VYD9HBX7EZ7BBNA7/image-asset.jpeg</image:loc>
      <image:title>Home</image:title>
      <image:caption>Photo by uchar/iStock / Getty Images</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1415298940687-2XURUXW19HI85QSANW4U/image-asset.jpeg</image:loc>
      <image:title>Services</image:title>
      <image:caption>Photo by DustyPixel/iStock / Getty Images</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1415298987846-E7STH816K3TIKSIAFLOY/image-asset.jpeg</image:loc>
      <image:title>Services</image:title>
      <image:caption>Photo by Robert Churchill/iStock / Getty Images</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1415299049756-AAQ44SWWUXTECLSCA14L/image-asset.jpeg</image:loc>
      <image:title>Services</image:title>
      <image:caption>Photo by Image Source/Stockbyte / Getty Images</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1415299120809-BH7OJNUDJP9IAPYP2FYO/image-asset.jpeg</image:loc>
      <image:title>Services</image:title>
      <image:caption>Photo by User9637786_380/iStock / Getty Images</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1415299218341-WDON1E2N5006NUY90HVZ/image-asset.jpeg</image:loc>
      <image:title>Services</image:title>
      <image:caption>Photo by Purestock/Purestock / Getty Images</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2014-12-02</lastmod>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/industries</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-04-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1415300716831-YZOJIQER0QXPWYHBZQ6G/image-asset.jpeg</image:loc>
      <image:title>Industries</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1415298603871-FR3QJ2H8IVL6X84CT7VL/image-asset.jpeg</image:loc>
      <image:title>Industries</image:title>
      <image:caption>Photo by Chesky_W/iStock / Getty Images</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1415298699830-LF4BCOMS56D1X7DAIS0C/image-asset.jpeg</image:loc>
      <image:title>Industries</image:title>
      <image:caption>Photo by plusphoto/amanaimagesRF/amana images / Getty Images</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1415298763025-EVGL28DGKCUOYZYKI98X/image-asset.jpeg</image:loc>
      <image:title>Industries</image:title>
      <image:caption>Photo by Gregory_DUBUS/iStock / Getty Images</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1461968895573-0AUVVWI3WLIXCPI26349/image-asset.jpeg</image:loc>
      <image:title>Industries</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-02-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/543effd8e4b095fba39dfe59/1453592989422-MP6AEHCICDVLDELWYE96/image-asset.jpeg</image:loc>
      <image:title>About</image:title>
      <image:caption>Photo by sezer66/iStock / Getty Images</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/careers</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/careers/pen-tester</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-06-29</lastmod>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/embedded-security-professional</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-06-29</lastmod>
  </url>
  <url>
    <loc>https://www.somersetrecon.com/account-manager</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-06-29</lastmod>
  </url>
</urlset>

