<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Fabrice's Blog</title><link>https://blog.redteamshell.com/</link><description>Recent content on Fabrice's Blog</description><generator>Hugo</generator><language>en</language><copyright>&lt;a href="https://creativecommons.org/licenses/by-nc/4.0/" target="_blank" rel="noopener">CC BY-NC 4.0&lt;/a></copyright><lastBuildDate>Sun, 25 Jan 2026 08:17:44 -0500</lastBuildDate><atom:link href="https://blog.redteamshell.com/index.xml" rel="self" type="application/rss+xml"/><item><title>The 2026 Deep Dive</title><link>https://blog.redteamshell.com/posts/2026/01/the-2026-deep-dive/</link><pubDate>Sun, 25 Jan 2026 08:17:44 -0500</pubDate><guid>https://blog.redteamshell.com/posts/2026/01/the-2026-deep-dive/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/2026_hero_image.png" alt="Hero Image">&lt;/p>
&lt;h3 id="going-deeper-into-code-review-reverse-engineering-and-web-exploitation">Going Deeper into Code Review, Reverse Engineering, and Web Exploitation&lt;/h3>
&lt;p>New year, new focus. This year I&amp;rsquo;m pushing myself to level up in three specific areas: code review, reverse engineering, and web exploitation. I&amp;rsquo;ve spent enough time doing surface-level testing, now I want to understand what&amp;rsquo;s actually happening under the hood.
I&amp;rsquo;ve already invested in the learning materials to make this happen, so there&amp;rsquo;s no backing out now.&lt;/p></description></item><item><title>Certified Cyber Security Engineer [CCSE] Review: Is it Worth it?</title><link>https://blog.redteamshell.com/posts/2025/12/certified-cyber-security-engineer-ccse-review-is-it-worth-it/</link><pubDate>Thu, 04 Dec 2025 17:31:16 -0500</pubDate><guid>https://blog.redteamshell.com/posts/2025/12/certified-cyber-security-engineer-ccse-review-is-it-worth-it/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/CCSE_hero.png" alt="CCSE Hero Image">&lt;/p>
&lt;p>I recently completed the Certified Cyber Security Engineer (CCSE) certification from Cyberwarfare Labs, and I wanted to share my experience with anyone considering this certification. Even though I already hold more advanced certifications like the OSCP and HackTheBox CPTS, I found the CCSE to be a valuable addition to my skill set, and here&amp;rsquo;s why.&lt;/p>
&lt;hr>
&lt;h3 id="what-is-the-ccse">What is the CCSE?&lt;/h3>
&lt;p>The Certified Cyber Security Engineer (CCSE) is a comprehensive penetration testing certification offered by Cyberwarfare Labs. What makes it stand out is its broad coverage of modern attack surfaces that many traditional pentesting certifications don&amp;rsquo;t touch. It&amp;rsquo;s designed for beginner to intermediate cybersecurity professionals who want to develop a well-rounded understanding of various technologies and attack vectors they&amp;rsquo;ll encounter as a cybersecurity engineer.&lt;/p></description></item><item><title>CDSA Review</title><link>https://blog.redteamshell.com/posts/2025/11/cdsa-review/</link><pubDate>Sat, 15 Nov 2025 16:13:23 -0500</pubDate><guid>https://blog.redteamshell.com/posts/2025/11/cdsa-review/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/CDSA_heroimage.png" alt="Intro Picture">&lt;/p>
&lt;h3 id="a-clear-overview-of-the-cdsa-certification">A Clear Overview of the CDSA Certification&lt;/h3>
&lt;p>In this post, I’ll share my experience with the HTB Certified Defensive Security Analyst (CDSA) certification. Whether you’re new to blue teaming or already familiar with CDSA, there’s something here for everyone.&lt;/p>
&lt;hr>
&lt;h3 id="what-is-the-htb-cdsa">What is the HTB CDSA?&lt;/h3>
&lt;p>&lt;img src="https://blog.redteamshell.com/images/HTB_CDSA.png" alt="HTB CDSA">&lt;/p>
&lt;p>The &lt;strong>Hack The Box Certified Defensive Security Analyst (CDSA)&lt;/strong> is a hands-on blue-team certification focused on real-world SOC operations. It evaluates your ability to monitor, investigate, detect, and respond to threats using enterprise-grade tools and realistic scenarios. The exam is fully practical and is directly based on the HTB Academy &lt;em>SOC Analyst&lt;/em> role path.&lt;/p></description></item><item><title>CRTP vs CRTE: Mastering Active Directory</title><link>https://blog.redteamshell.com/posts/2025/09/crtp-vs-crte-mastering-active-directory/</link><pubDate>Sat, 13 Sep 2025 10:23:10 -0400</pubDate><guid>https://blog.redteamshell.com/posts/2025/09/crtp-vs-crte-mastering-active-directory/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/CRTPvsCRTE.png" alt="CRTPvsCRTE">&lt;/p>
&lt;p>Two years ago, I embarked on a challenging journey that would fundamentally transform my understanding of Active Directory security and red teaming. Today, I want to share my experience with two exceptional certifications from Altered Security: the Certified Red Team Professional (CRTP) and the Certified Red Team Expert (CRTE).&lt;/p>
&lt;h3 id="why-i-chose-these-certifications">Why I Chose These Certifications&lt;/h3>
&lt;p>As someone looking to build a solid foundation in Active Directory penetration testing, I was drawn to Altered Security&amp;rsquo;s reputation for creating realistic, hands-on environments. Unlike many other certifications that rely heavily on theoretical knowledge or outdated exploitation techniques, both CRTP and CRTE focus on abusing legitimate Active Directory features and functionalities in fully patched environments.&lt;/p></description></item><item><title>Threat Hunting: FIN7 - Post Compromise Execution</title><link>https://blog.redteamshell.com/posts/2025/09/threat-hunting-fin7-post-compromise-execution/</link><pubDate>Sun, 07 Sep 2025 13:59:10 -0400</pubDate><guid>https://blog.redteamshell.com/posts/2025/09/threat-hunting-fin7-post-compromise-execution/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/FIN7_Blog_post2.png" alt="FIN7 - Post Compromise Execution">&lt;/p>
&lt;h3 id="introduction">Introduction&lt;/h3>
&lt;p>In Part 2, we pivot from initial access to what happened next. Using Windows event logs and PowerShell Operational logs in Splunk, we reconstructed FIN7’s execution chain after persistence via a scheduled task, validated key artifacts, and built practical detections you can run.&lt;/p>
&lt;h3 id="what-we-investigated">What we investigated&lt;/h3>
&lt;ul>
&lt;li>Scheduled Task execution timing and payload&lt;/li>
&lt;li>Process tree spawned by the persisted loader&lt;/li>
&lt;li>PowerShell script executions including repeated stagers&lt;/li>
&lt;li>Reconstruction of the staged PowerShell from events (4104) and file hashing for IOC tracking&lt;/li>
&lt;/ul>
&lt;h3 id="interpretation-of-the-decoded-script-from-initial-access-recap">Interpretation of the Decoded Script from Initial Access (Recap)&lt;/h3>
&lt;p>what we have got here is essentially a decoded RTF payload that was obfuscated using &lt;code>\chr&lt;/code> encoding. Once decoded, it reveals a malicious VBScript designed to drop and persist a RAT (remote access trojan). Lets break down the key points :&lt;/p></description></item><item><title>Red Team Infra Dev</title><link>https://blog.redteamshell.com/posts/2025/08/red-team-infra-dev/</link><pubDate>Sat, 30 Aug 2025 08:43:24 -0400</pubDate><guid>https://blog.redteamshell.com/posts/2025/08/red-team-infra-dev/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/RedTeamInfraDev.png" alt="Red Team Infra Dev">&lt;/p>
&lt;h3 id="my-experience-with-the-crt-id-certification">My Experience with the CRT-ID Certification&lt;/h3>
&lt;p>I recently completed the &lt;strong>Certified Red Team Infrastructure Developer (CRT-ID)&lt;/strong> certification from Cyberwarfare Labs, and I&amp;rsquo;m excited to share my comprehensive review of this unique course. If you&amp;rsquo;re looking to enhance your red teaming skills with a focus on infrastructure development, this might be exactly what you need.&lt;/p>
&lt;hr>
&lt;h3 id="what-is-the-crt-id-course-about">What is the CRT-ID Course About?&lt;/h3>
&lt;p>The &lt;strong>Certified Red Team Infrastructure Developer (CRT-ID)&lt;/strong> is a specialized course designed to equip cybersecurity professionals with the skills to develop OPSEC-safe Red Team infrastructure for both internal and external operations. Unlike many other red team courses that focus primarily on exploitation techniques, this course dives deep into the infrastructure backbone that makes successful red team operations possible.&lt;/p></description></item><item><title>Threat Hunting: FIN7 - Initial Access</title><link>https://blog.redteamshell.com/posts/2025/08/threat-hunting-fin7-initial-access/</link><pubDate>Thu, 14 Aug 2025 19:03:54 -0400</pubDate><guid>https://blog.redteamshell.com/posts/2025/08/threat-hunting-fin7-initial-access/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/FIN7_Blog_post1.png" alt="Fin7_blogpost_1">&lt;/p>
&lt;h3 id="introduction">Introduction&lt;/h3>
&lt;p>Welcome to the first post in my Threat Hunting series. We are starting with FIN7’s initial access tradecraft: a phishing-delivered, weaponized RTF that abuses living-off-the-land binaries and scheduled tasks to get a foothold. This post distills the key artifacts and shows practical hunts you can run.&lt;/p>
&lt;blockquote>
&lt;p>This is Part 1 of my Threat Hunting series. Each post focuses on one phase of an intrusion with practical hunts and response tips.&lt;/p></description></item><item><title>CBBH Review</title><link>https://blog.redteamshell.com/posts/2025/08/cbbh-review/</link><pubDate>Wed, 13 Aug 2025 04:21:58 -0400</pubDate><guid>https://blog.redteamshell.com/posts/2025/08/cbbh-review/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/cbbh_intro_img.png" alt="Intro Picture">&lt;/p>
&lt;h2 id="a-clear-overview-of-the-cbbh-certification">A Clear Overview of the CBBH Certification&lt;/h2>
&lt;p>In this post, I’ll share my experience with the HTB Certified Bug Bounty Hunter (CBBH) certification. Whether you’re new to web penetration testing or already familiar with CBBH, there’s something here for everyone.&lt;/p>
&lt;hr>
&lt;h3 id="what-is-web-application-penetration-testing-and-bug-bounty-hunting">What is Web Application Penetration Testing and Bug Bounty Hunting?&lt;/h3>
&lt;p>Web Application Penetration Testing is the practice of assessing the security of web applications by simulating real-world attacks. The goal is to identify vulnerabilities such as SQL injection, XSS, authentication bypass, and more, before malicious actors can exploit them.&lt;/p></description></item><item><title>MicroMasters Cybersecurity RITx</title><link>https://blog.redteamshell.com/posts/2025/07/micromasters-cybersecurity-ritx/</link><pubDate>Fri, 04 Jul 2025 15:17:16 -0400</pubDate><guid>https://blog.redteamshell.com/posts/2025/07/micromasters-cybersecurity-ritx/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/MicroMasters_Cybersecurity.png" alt="MicroMasters Cybersecurity">&lt;/p>
&lt;p>In &lt;strong>August 2019&lt;/strong>, I enrolled in the &lt;strong>RITx MicroMasters in Cybersecurity&lt;/strong>, a program delivered by the &lt;strong>Rochester Institute of Technology (RIT)&lt;/strong> in partnership with &lt;strong>edX&lt;/strong>. At the time, the program didn&amp;rsquo;t have open enrollment, so I had to wait until &lt;strong>January 2020&lt;/strong> to get started.&lt;/p>
&lt;p>My goal was clear: gain the foundational skills and credibility needed to transition into a cybersecurity career. Although COVID hitted the same year and disrupted job prospects, the knowledge and skills I gained helped me secure an &lt;strong>IT position&lt;/strong> later on. In hindsight, this program was a meaningful step in my professional growth.&lt;/p></description></item><item><title>Understanding POP-POP-RET in SEH Exploits</title><link>https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/</link><pubDate>Mon, 26 May 2025 16:28:21 -0400</pubDate><guid>https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/SEH_Blog.png" alt="Blog Picture">&lt;/p>
&lt;p>&lt;em>Part of the Exploit Development Module – Certified Cybersecurity Engineer (CCSE) – By Cyberwarfare Labs&lt;/em>&lt;/p>
&lt;hr>
&lt;h3 id="-table-of-contents">📚 Table of Contents&lt;/h3>
&lt;ol>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#introduction">Introduction&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#what-is-a-stack-overflow">What is a Stack Overflow?&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#understanding-structured-exception-handling-seh">Understanding Structured Exception Handling (SEH)&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#where-does-pop-pop-ret-come-in">Where Does POP-POP-RET Come In?&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#breaking-down-pop-pop-ret">Breaking Down POP-POP-RET&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#step-by-step-example-of-using-pop-pop-ret-in-an-seh-exploit">Step-by-Step Example of Using POP-POP-RET in an SEH Exploit&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#finding-a-suitable-pop-pop-ret-instruction">Finding a Suitable POP-POP-RET Instruction&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#example-exploit-code">Example Exploit Code&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#what-happens-when-we-run-the-exploit">What Happens When We Run the Exploit?&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#conclusion">Conclusion&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/05/understanding-pop-pop-ret-in-seh-exploits/#next-steps">Next Steps&lt;/a>&lt;/li>
&lt;/ol>
&lt;hr>
&lt;h3 id="-introduction">🔰 Introduction&lt;/h3>
&lt;p>This blog post is part of the &lt;strong>Exploit Development&lt;/strong> module in my journey through the &lt;strong>Certified Cybersecurity Engineer (CCSE)&lt;/strong> certification by &lt;strong>Cyberwarfare Labs&lt;/strong>.&lt;/p></description></item><item><title>Threat Hunting vs Threat Intelligence</title><link>https://blog.redteamshell.com/posts/2025/05/threat-hunting-vs-threat-intelligence/</link><pubDate>Mon, 12 May 2025 20:11:48 -0400</pubDate><guid>https://blog.redteamshell.com/posts/2025/05/threat-hunting-vs-threat-intelligence/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/ThreatHuntingvsThreatResearch.png" alt="Cover">&lt;/p>
&lt;p>As part of my learning journey through the Hack The Box Certified Defensive Security Analyst (CDSA) certification, I’ve recently explored a fascinating topic—&lt;strong>threat hunting&lt;/strong>. The more I dive in, the more I realize how important it is to distinguish between &lt;strong>threat hunting&lt;/strong> and &lt;strong>cyber threat intelligence (CTI)&lt;/strong>. While both disciplines play vital roles in modern cybersecurity programs, they serve different functions and require distinct approaches.&lt;/p>
&lt;p>In this inaugural post for my new blog section dedicated to threat hunting, CTI, and threat actors, I want to explore how these two areas intersect, how they differ, and why both are essential to defending against today’s cyber threats.&lt;/p></description></item><item><title>The Pentesting Trifecta CPTS-OSCP-PNPT</title><link>https://blog.redteamshell.com/posts/2025/05/the-pentesting-trifecta-cpts-oscp-pnpt/</link><pubDate>Sun, 11 May 2025 09:35:44 -0400</pubDate><guid>https://blog.redteamshell.com/posts/2025/05/the-pentesting-trifecta-cpts-oscp-pnpt/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/CPTS_OSCP_PNPT.png" alt="Main Image">&lt;/p>
&lt;p>After months of dedication and late nights, I’ve earned what I call the &lt;strong>Trifecta of Penetration Testing Certifications&lt;/strong>: the &lt;strong>PNPT&lt;/strong>, &lt;strong>OSCP&lt;/strong>, and &lt;strong>CPTS&lt;/strong>. In this post, I’ll break down each certification—covering content, pricing, exam duration, realism, and difficulty—based on my personal journey. If you&amp;rsquo;re debating which cert to pursue, I hope this guide helps.&lt;/p>
&lt;hr>
&lt;h3 id="overview-of-each-certification">Overview of Each Certification&lt;/h3>
&lt;h3 id="-pnpt--practical-network-penetration-tester">🔴 PNPT – Practical Network Penetration Tester&lt;/h3>
&lt;p>&lt;img src="https://blog.redteamshell.com/images/PNPT%28250x250%29.png" alt="PNPT">&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Provider&lt;/strong>: TCM Security&lt;/li>
&lt;li>&lt;strong>URL&lt;/strong>: &lt;a href="https://certifications.tcm-sec.com/pnpt/">certifications.tcm-sec.com/pnpt&lt;/a>&lt;/li>
&lt;li>&lt;strong>Cost&lt;/strong>: $499 USD (includes training and exam)&lt;/li>
&lt;li>&lt;strong>Duration&lt;/strong>: 5-day engagement + 2 days for reporting&lt;/li>
&lt;li>&lt;strong>Content Focus&lt;/strong>:
&lt;ul>
&lt;li>External/Internal recon and exploitation&lt;/li>
&lt;li>Active Directory attacks&lt;/li>
&lt;li>OSINT&lt;/li>
&lt;li>Pivoting&lt;/li>
&lt;li>Report writing&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>&lt;strong>Exam Format&lt;/strong>: Realistic corporate AD environment; compromise the domain controller and submit a professional report.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h3 id="-oscp--offensive-security-certified-professional">🟠 OSCP – Offensive Security Certified Professional&lt;/h3>
&lt;p>&lt;img src="https://blog.redteamshell.com/images/OSCP%28250x250%29.png" alt="OSCP">&lt;/p></description></item><item><title>CDSA | Part 1</title><link>https://blog.redteamshell.com/posts/2025/05/cdsa-part-1/</link><pubDate>Thu, 01 May 2025 11:33:06 -0400</pubDate><guid>https://blog.redteamshell.com/posts/2025/05/cdsa-part-1/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/HTB_CDSA.png" alt="HTB CDSA">&lt;/p>
&lt;p>As someone who primarily walks the path of the Red Team, I’ve always been immersed in penetration testing, adversarial simulation, and offensive operations. But lately, I’ve realized something crucial — truly mastering offensive security requires seeing things from the defender’s perspective too. That’s why I decided to take on the &lt;strong>Hack The Box Certified Defensive Security Analyst (CDSA)&lt;/strong> certification.&lt;/p>
&lt;hr>
&lt;h3 id="-what-is-htb-cdsa">🛡️ What is HTB CDSA?&lt;/h3>
&lt;p>The &lt;strong>HTB Certified Defensive Security Analyst (CDSA)&lt;/strong> is a highly hands-on certification offered by (&lt;a href="https://academy.hackthebox.com/preview/certifications/htb-certified-defensive-security-analyst" target="_blank" rel="noopener noreferrer">Hack The Box&lt;/a>
). It focuses on &lt;strong>security analysis&lt;/strong>, &lt;strong>SOC operations&lt;/strong>, and &lt;strong>incident handling&lt;/strong> at an intermediate level. Unlike many traditional certifications that focus on theory, CDSA emphasizes practical, real-world skills — the kind you’ll actually need working in or alongside a SOC.&lt;/p></description></item><item><title>CRTS v2 | Part 2</title><link>https://blog.redteamshell.com/posts/2025/04/crts-v2-part-2/</link><pubDate>Mon, 14 Apr 2025 20:48:51 -0400</pubDate><guid>https://blog.redteamshell.com/posts/2025/04/crts-v2-part-2/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/Cert.png" alt="Cert CRTSv2">&lt;/p>
&lt;h3 id="crtsv2-certification-review--final-thoughts-after-passing-the-exam">CRTSv2 Certification Review – Final Thoughts After Passing the Exam&lt;/h3>
&lt;p>This post is the second and final part of my review of the (&lt;a href="https://cyberwarfare.live/product/red-team-specialist-crts/" target="_blank" rel="noopener noreferrer">CRTSv2&lt;/a>
) certification by CyberWarFare Labs. In the first part, I covered my experience during the course. This post will wrap things up with a full breakdown of the lab, exam, preparation, and how it stacks up against similar certs.&lt;/p>
&lt;hr>
&lt;h3 id="table-of-contents">Table of Contents&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/04/crts-v2-part-2/#course-material">Course Material&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/04/crts-v2-part-2/#lab-experience">Lab Experience&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/04/crts-v2-part-2/#exam">Exam&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/04/crts-v2-part-2/#preparation">Preparation&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/04/crts-v2-part-2/#comparison">Comparison&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://blog.redteamshell.com/posts/2025/04/crts-v2-part-2/#final-thoughts">Final Thoughts&lt;/a>&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h3 id="course-material">Course Material&lt;/h3>
&lt;p>The course is divided into two main modules:&lt;/p></description></item><item><title>CRTS v2 | Part 1</title><link>https://blog.redteamshell.com/posts/2025/03/crts-v2-part-1/</link><pubDate>Sun, 02 Mar 2025 06:43:06 -0500</pubDate><guid>https://blog.redteamshell.com/posts/2025/03/crts-v2-part-1/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/red-team-specialist.jpeg" alt="Profile Picture">&lt;/p>
&lt;h3 id="my-journey-through-the-certified-red-team-specialist-crts-v2-course">My Journey Through the Certified Red Team Specialist (CRTS v2) Course&lt;/h3>
&lt;p>After successfully completing CRTS v1, I decided to take on &lt;strong>CRTS v2&lt;/strong> by Cyber Warfare Labs. This blog post will document my journey as I work through the course material and prepare for the hands-on exam by the &lt;strong>end of March&lt;/strong>.&lt;/p>
&lt;hr>
&lt;h3 id="my-experience-with-crts-v1">My Experience with CRTS v1&lt;/h3>
&lt;p>In the previous version of this course, the lab covered the following scenarios:&lt;/p></description></item><item><title>CCSE | Part 1</title><link>https://blog.redteamshell.com/posts/2025/03/ccse-part-1/</link><pubDate>Sat, 01 Mar 2025 16:25:32 -0500</pubDate><guid>https://blog.redteamshell.com/posts/2025/03/ccse-part-1/</guid><description>&lt;style>
 .two-column-container {
 display: flex;
 align-items: center;
 gap: 20px;
 }
 @media (max-width: 768px) {
 .two-column-container {
 flex-direction: column;
 }
 }
 &lt;/style>
 
 &lt;div class="two-column-container">
 &lt;div style="flex: 1;">
 &lt;img src="https://blog.redteamshell.com/images/CCSE-Badge-2.png" alt="Cybersecurity Image" style="max-width: 100%; height: auto;">
 &lt;/div>
 &lt;div style="flex: 1;">
 

The Certified Cyber Security Engineer (CCSE) is a comprehensive training program offered by Cyber Warfare Labs (CWL) that focuses on real-world penetration testing across 14 distinct domains. Participants gain access to over 50 online labs available 24/7 via the CWL Cyber Security Playground (CCSP). These labs provide hands-on experience with intentionally vulnerable virtual machines, allowing learners to practice market-oriented, practical penetration testing.

 &lt;/div>
 &lt;/div> 
 
&lt;hr>
&lt;h3 id="my-journey-through-the-certified-cyber-security-engineer-ccse-course">My Journey Through the Certified Cyber Security Engineer (CCSE) Course&lt;/h3>
&lt;p>I recently embarked on the Certified Cyber Security Engineer (CCSE) course by Cyber Warfare Labs, with the goal of completing it and taking the exam by the end of April. While I haven’t completed the course yet, this blog post will document my journey, sharing my thoughts and insights along the way.&lt;/p></description></item><item><title>CPTS Review</title><link>https://blog.redteamshell.com/posts/2025/01/cpts-review/</link><pubDate>Sun, 26 Jan 2025 00:00:00 +0000</pubDate><guid>https://blog.redteamshell.com/posts/2025/01/cpts-review/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/CPTS_DONE2.png" alt="Profile Picture">&lt;/p>
&lt;h2 id="a-clear-overview-of-the-cpts-certification">A Clear Overview of the CPTS Certification&lt;/h2>
&lt;p>In this post, I’ll share my experience with the HTB Certified Penetration Testing Specialist (CPTS) certification. Whether you’re new to penetration testing or already familiar with CPTS, there’s something here for everyone.&lt;/p>
&lt;hr>
&lt;h3 id="what-is-penetration-testing">What is Penetration Testing?&lt;/h3>
&lt;p>Penetration testing, or pen testing, involves authorized simulated cyberattacks on systems and networks. The goal? To identify and fix vulnerabilities before hackers exploit them. As a pen tester, you’ll document your findings and create reports detailing your approach and results.&lt;/p></description></item><item><title>About Me</title><link>https://blog.redteamshell.com/about/</link><pubDate>Sat, 18 Jan 2025 00:00:00 +0000</pubDate><guid>https://blog.redteamshell.com/about/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/new_profile.jpg" alt="Profile Picture">&lt;/p>
&lt;p>I&amp;rsquo;m a Novice Security Researcher specializing in &lt;strong>Penetration Testing&lt;/strong>, &lt;strong>Ethical Hacking&lt;/strong>, and &lt;strong>Red Teaming&lt;/strong>. With a background in &lt;strong>Electronic Engineering&lt;/strong> and a &lt;strong>Micromasters in Cybersecurity&lt;/strong> from &lt;strong>Rochester Institute of Technology (RIT)&lt;/strong>, I hold certifications like &lt;strong>OSCP&lt;/strong>, &lt;strong>CPTS&lt;/strong>, &lt;strong>CBBH(now CWES)&lt;/strong>, &lt;strong>CDSA&lt;/strong>, &lt;strong>PNPT&lt;/strong>, &lt;strong>CRTE&lt;/strong>, &lt;strong>CRTP&lt;/strong>, &lt;strong>CRTS&lt;/strong>, &lt;strong>CCSE&lt;/strong>, &lt;strong>CRTA&lt;/strong> and &lt;strong>CEH (Practical)&lt;/strong>.&lt;/p>
&lt;style>
 .image-row {
 display: flex;
 justify-content: center;
 align-items: center;
 gap: 10px;
 flex-wrap: wrap;
 }
 .image-row img {
 max-width: 100px; 
 height: auto;
 }
 &lt;/style>
 
 &lt;div class="image-row">
 
 &lt;img src="https://blog.redteamshell.com/images/OSCP-Badge.png" alt="Badge">
 
 &lt;img src="https://blog.redteamshell.com/images/HTB-CPTS-Badge.png" alt="Badge">
 
 &lt;img src="https://blog.redteamshell.com/images/CBBH_Logo.png" alt="Badge">
 
 &lt;img src="https://blog.redteamshell.com/images/CDSA_Logo.png" alt="Badge">
 
 &lt;img src="https://blog.redteamshell.com/images/PNPT-badge.png" alt="Badge">
 
 &lt;img src="https://blog.redteamshell.com/images/CRTE-Badge.png" alt="Badge">
 
 &lt;img src="https://blog.redteamshell.com/images/CRTP.png" alt="Badge">
 
 &lt;img src="https://blog.redteamshell.com/images/CRTS-Badge-1.png" alt="Badge">
 
 &lt;img src="https://blog.redteamshell.com/images/CRTA-Badge-1.png" alt="Badge">
 
 &lt;img src="https://blog.redteamshell.com/images/CCSE_badge.png" alt="Badge">
 
 &lt;/div>
 
&lt;p>Starting my career in customer service, I quickly advanced through roles in IT support, System Administration and IT Manager. In my current position, I manage all IT and cybersecurity functions, balancing both &lt;strong>offensive&lt;/strong> and &lt;strong>defensive security&lt;/strong> operations. I&amp;rsquo;ve implemented a successful &lt;strong>Penetration Testing&lt;/strong> program, overseeing both &lt;strong>Red&lt;/strong> and &lt;strong>Blue Team&lt;/strong> activities to secure company infrastructure.&lt;/p></description></item><item><title>Welcome to My Blog</title><link>https://blog.redteamshell.com/posts/2025/01/welcome-to-my-blog/</link><pubDate>Sat, 18 Jan 2025 00:00:00 +0000</pubDate><guid>https://blog.redteamshell.com/posts/2025/01/welcome-to-my-blog/</guid><description>&lt;p>I&amp;rsquo;m a novice security researcher who specializes in &lt;strong>penetration testing&lt;/strong>, &lt;strong>ethical hacking&lt;/strong>, and &lt;strong>red teaming&lt;/strong>. I created this blog to document what I&amp;rsquo;ve learned and share practical insights from my work in Cybersecurity.&lt;/p>
&lt;p>My path here wasn&amp;rsquo;t exactly traditional. I started out studying literature in secondary school, which taught me how to think critically and solve problems, skills that turned out to be surprisingly useful in cybersecurity. From there, I earned a Bachelor&amp;rsquo;s in Electronic Engineering and a Professional Diploma in Computer Engineering before completing a Micromasters in Cybersecurity through Rochester Institute of Technology.&lt;/p></description></item></channel></rss>