About

Hey, I’m Daniyal Ahmed

I’m a Red Team & Cloud Security Engineer based in Pakistan. I break things professionally cloud environments, Active Directory, web apps and write about how I did it so others can defend better.

This blog is where I dump real-world attack techniques, cloud misconfiguration breakdowns, CTF writeups, and tooling I build along the way.

What I Work On

  • Cloud Pentesting — Azure / Entra ID attack paths, privilege escalation, lateral movement across tenants
  • Red Team Operations — Initial access, credential abuse, defense evasion in modern enterprise environments
  • Active Directory — Kerberoasting, ACL abuse, BloodHound analysis, domain takeover chains
  • Bug Bounty — Web vulnerabilities, API security, logic flaws in real targets
  • Tooling — Scripts, automation, and custom payloads built for offensive ops

Certifications & Study

  • SC-200 (Identity & Access) — in progress
  • CRTOM - Red Team Leaders

Writing Philosophy

Every post here comes from something I actually ran against a lab, a CTF, or a real engagement. I explain the why behind each technique, not just the commands. If you can’t explain it, you don’t own it.


Contact

“Offense informs defense. Know how it breaks to know how to build.”