About Me
A small brief about me.
└─# Whoami:
This is Obaida Albasha, also known as Caesar3.
Offensive security practitioner with 4+ years of hands-on experience in Capture The Flag (CTF) competitions and lab environments across multiple platforms. Strong focus on red teaming, web application, network and systems exploitation, and active directory attacks.
Seeking opportunities in penetration testing and red teaming, where I can continue to grow while helping organizations strengthen their security posture and apply my skills in real-world engagements.
Education:
Bachelor of Applied Computing – Cyber Security Track at King Saud University 2020–2022
Completed 3 semesters.
Experience:
CTF player 2021 - Present
Actively participate in Capture The Flag (CTF) challenges, machines and hands-on labs across platforms including HackTheBox, TryHackMe, OffSec PG, HackMyVM, FlagYard, INE, CyberDefenders, and other competitive CTF events.
Perform API and Web Application Enumeration & Exploitation, identifying and exploiting vulnerabilities such as:
SQL Injection (SQLi)
Cross-Site Scripting (XSS)
Server-Side Request Forgery (SSRF)
Insecure Deserialization
etc.
Conduct Active Directory and Network Enumeration & Exploitation, including:
Abuse of Active Directory ACLs and misconfigurations
Kerberos-based attacks (e.g., Kerberoasting, AS-REP Roasting, Delegations)
Privilege Escalation and Lateral Movement techniques
etc.
Practice realistic attack workflows following enumeration → exploitation → post-exploitation methodologies.
I have several certifications:
INE, eMAPT (Mobile Application Penetration Tester) (In Progress)
INE, eCTHP (Certified Threat Hunting Professional)
CyberWarfare, MCRTA (Multi-Cloud Red Team Analyst)
OffSec, OSCP/OSCP+ (OffSec Certified Professional/+)
Red Team Leaders, CCEP (Certified Cybersecurity Educator Professional)
TryHackMe, PT1 (Junior Penetration Tester)
Altered Security, CRTP (Certified Red Team Professional)
INE, eWPTX (Web Application Penetration Tester eXtreme)
INE, ICCA (INE Certified Cloud Associate)
CyberWarfare, CRTA (Certified Red Team Analyst)
INE, eCPPT (Certified Professional Penetration Tester)
INE, eWPT (Web Application Penetration Tester)
INE, eJPT (Junior Penetration Tester)
Codecademy, Learn Python 3 Course
Skills:
Management
Problem solving
Leadership
Love of Learning
Infrastructure (Active Directory, Network, System/Host) Penetration Testing:
Enumeration
Exploitation
Privilege Escalation
Pivoting & Tunneling
Lateral Movement
Application (Web, API, Mobile) Penetration Testing
Basic Cloud (AWS, Azure, GCP) Penetration Testing
Client-Side Attacks
C2 Frameworks:
Metasploit
PowerShell-Empire
Threat Hunting (Network, Endpoint)
Python Programming
Honors & Awards:
First Place in Salam CTF
Won the CyberHub Offensive Challenge
First Place in the CyberHub AD PT CTF Challenge
Eighth Place in the CyberHub Network PT CTF Challenge
Second Place at the FlagYard Booth - LEAP 2024
Sixth Place at the Cyberani CTF Booth - LEAP 2024
Sixth Place in the (CyberHub & KSU Cyber) OSINT CTF
Ninth Place in the Cyber Hub CTF 2023
Sixth Place in the KSU CTF
Languages:
Arabic (Native)
English
My LinkedIn & My X & My CV:
Note:
I created this GitBook to share my experiences in the cybersecurity field, along with insights and notes from studying for certifications and hands-on practice. Please, if you noticed any mistakes, misconceptions, or anything I may have misunderstood, feel free to reach out to me on my LinkedIn or my X (formerly Twitter) accounts.
Last updated