About Me
A small brief about me.
└─# Whoami:
This is Obaida Albasha a high school graduate, also known as Caesar3.
I am passionate about cybersecurity with a focus on Red Teaming. Currently seeking opportunities to apply my skills in ethical hacking and penetration testing to help organizations strengthen their security posture. Eager to learn, grow, and contribute to the cybersecurity field.
Education:
Bachelor of Applied Computing – Cyber Security Track at King Saud University 2020–2022
Incomplete. I quit due to certain circumstances.
Experience:
CTF player 2021 - Present
I've been playing CTF on several platforms, including HTB, THM, Offsec PG, HMV, FlagYard, INE, and others, and I am still participating in CTF events.
I have several certifications:
TryHackMe, PT1(Junior Penetration Tester)
Acquired the PT1 certification, gaining hands-on experience in Active Directory attacks, network exploitation, and web application security testing.
Altered Security, CRTP (Certified Red Team Professional)
Achieved the CRTP certification, validating hands-on skills in Active Directory enumeration, privilege escalation, persistence, and cross/forest trust attacks.
INE, eWPTX (Web Application Penetration Tester eXtreme)
Mastered advanced web application security through manual vulnerability discovery, exploitation of API security testing, authentication bypass techniques, and advanced attacks (SQLi, SSRF, and deserialization).
INE, ICCA (INE Certified Cloud Associate)
Developed foundational knowledge in cloud computing and security, focusing on core concepts across AWS, Azure, and GCP. Gained practical experience in cloud architecture, IAM, networking, and basic cloud service configuration and security principles.
CyberWarfare, CRTA (Certified Red Team Analyst)
Acquired advanced red teaming skills through simulated adversary emulation. Gained hands-on experience in initial access, internal reconnaissance, lateral movement, Active Directory attacks, and command & control (C2) operations within hardened environments.
INE, eCPPT (Certified Professional Penetration Tester)
Developed solid knowledge in penetration testing, covering network scanning, vulnerability assessment, exploitation, and post-exploitation techniques (pivoting, privilege escalation), and Active Directory exploitation.
INE, eWPT (Web Application Penetration Tester)
Acquired key knowledge in web application penetration testing, focusing on identifying and exploiting vulnerabilities such as SQL injection, XSS, session hijacking, command execution, file&resources attacks, and CSRF.
INE, eJPT (Junior Penetration Tester)
Gained foundational knowledge in penetration testing, including techniques for network mapping and scanning, vulnerability assessment, and exploitation.
Codecademy, Learn Python 3 Course
Got a strong understanding of Python 3 programming, covering fundamentals like variables, data types, control flow, functions, and object-oriented programming (OOP).
Skills:
Management
Problem solving
Leadership
Love of Learning
Active Directory Penetration Testing
Network Penetration Testing:
Enumeration
Exploitation
Privilege Escalation
Pivoting & Tunneling
Lateral Movement
Client-Side Attacks
C2 Frameworks:
Metasploit
PowerShell-Empire
Web Application Penetration Testing
Python Programming
Honors & Awards:
Won the CyberHub Offensive Challenge
First Place at the CyberHub AD PT CTF Challenge
Eighth Place at the CyberHub Network PT CTF Challenge
Second Place at the FlagYard Booth - LEAP 2024
Sixth Place at the (CyberHub & KSU Cyber) OSINT CTF
Ninth Place at the Cyber Hub CTF 2023
Sixth Place at the KSU CTF
Languages:
Arabic (Native)
English
My LinkedIn & My X & My CV:
Note:
I created this GitBook to share my experiences in the cybersecurity field, along with insights and notes from studying for certifications and hands-on practice. Please, if you notice any mistakes, misconceptions, or anything I may have misunderstood, feel free to reach out to me on my LinkedIn and my X (formerly Twitter) accounts.
Last updated