John U
@jdu2600
Followers
705
Following
2K
Media
13
Statuses
883
He/him. Security Research Engineer @preluderesearch. ex-@elasticseclabs ex-@CyberGovAu
Perth, Western Australia
Joined August 2017
New research from @jdu2600: a clean loader-lock escape using the PEB's PostProcessInitRoutine. Read the analysis and PoC code 📃
preludesecurity.com
Use PEB's PostProcessInitRoutine to run code after DLL init but outside the loader lock, enabling simple reliable early execution on process startup.
2
36
93
Just uploaded my RomHack slides about attack vectors against PsSetLoadImageNotifyRoutine and drivers that rely on it. Enjoy! https://t.co/LRYsCCm3nw
3
42
119
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog:
dirkjanm.io
While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise...
143
907
3K
I’ll be around if anyone wants to chat about endpoint security.
2
1
29
Announcing our whitepaper on the future of endpoint security. https://t.co/NogsQiku9B
preludesecurity.com
A research preview of our user-mode Windows agent that comprehensively catches malicious code execution.
6
88
285
I'm happy to finally release NovaHypervisor! NovaHypervisor is a defensive hypervisor with the goal of protecting AV/EDR vendors and crucial kernel structures that are currently uncovered by VBS and PatchGuard. Full explanation below 1/6. https://t.co/BGszXQ0Oi6
github.com
NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (either via Bring Your Own Vulnerable Driver (BYOVD) or other mean...
7
89
339
An increased visibility into threads' call stacks helps with more reliable malware detection. The approach is based on ETW telemetry and module's Export Directory data for information enrichment. A post by John Uhlmann of @elasticseclabs. Great read! #redteam #blueteam #maldev
2
25
73
@dwizzzleMSFT @Laughing_Mantis @HuntressLabs We’ve been trying to join MVI for years, but don’t get accepted because we don’t delete malware from endpoints. Super frustrating. We’re deployed on over a million endpoints and want to stick to best practices.
1
1
4
Dive deep into malware detection with the latest article by John Uhlmann: "Call Stacks: No More Free Passes for Malware." Discover how call stacks provide vital insights into malware behavior. Read more:
elastic.co
We explore the immense value that call stacks bring to malware detection and why Elastic considers them to be vital Windows endpoint telemetry despite the architectural limitations.
1
44
128
ATT&CK never felt quite right to me. I originally thought it was just that the taxonomy was incomplete. Then @jaredcatkinson framed my misgivings as a missing dimension and it just clicked.
Join @jdu2600 to explore the concept of Execution Modality within #detections — specifically, how modality-focused detections can complement behavior-focused ones: https://t.co/Bh7wnWjKfv
#ElasticSecurityLabs #detectionengineering
0
3
18
Zero Trust and EDR Tier list rated by nation-state funded AI catgirls. ranked by amount of snake oil in product
65
92
915
Yarden Shafir (@yarden_shafir) is back for Offensivecon 2025 🤩 Sign up now to the Windows Internals Training. *Training tickets also guarantee first slots in the waiting list for conference tickets. https://t.co/IHEJpY5RsZ
0
10
49
The @wisporg board is coming together to determine our top priorities for 2025 - YOU get to instruct us on what you would like those priorities to be! Need more scholarships, cons, exams/certs, mentors, events, or something else? Tell us your needs! https://t.co/oenmAuXR4X
docs.google.com
Thank you for providing your anonymous feedback to help us support you and the community in the very best ways in 2025!
3
8
17
New blog from me on using CLR customizations to improve the OPSEC of your .NET execution harness. This includes a novel AMSI bypass that I identified in 2023. By taking control of CLR assembly loads, we can load assemblies from memory with no AMSI scan.
ibm.com
Learn how red teams can modernize their use of .NET assemblies using CLR customizations.
13
148
428
Behold this magnificent and ridiculously photogenic crew, tasked with choosing the speakers for the upcoming BlueHat IL conference. Ready to wow them with your pitch-perfect abstract? Of course, you do - so why wait, submit it today: https://t.co/Rl8t6wIqDR
2
8
38
Our talk at #BHEU is done! Hope you all enjoyed it. 😉 A detailed blog is on the way, but in the meantime, check out the pre-alpha website https://t.co/lGRfqhmcVK for early access and the slides! Huge thanks to @BlackHatEvents and my awesome co-presenter @_splitline_! 🐈
15
225
787
Exciting news! I’m starting X-Force’s new offensive research team (XOR) and hiring a security researcher. Want to work with researchers (like @FuzzySec and I) to find bugs, exploit popular targets, and share your work? Apply for this unique (remote) role 😊 https://t.co/mlVBYdGCcF
14
110
524
We have good news for those who missed out on our Advanced Detection Engineering in the Enterprise training at Black Hat US. Our ADE training is coming to Black Hat Asia 2025, in Singapore! Registration is open! Information and registration: https://t.co/diT6aJKLp5
0
3
6
It’s wonderful to see what @XenoKovah and his collaborators have built for the community. I always recommend OST2 for my new hires and other juniors, or just anyone trying to get started on a new topic. The courses are excellent. It’s an honor to sponsor the Windows Security Path
Thanks to Winsider Seminars & Solutions (@yarden_shafir & @aionescu) for Sponsoring #OST2 at the Gold🥇 level! Learn more about them here: https://t.co/PEnKmkPx21
0
16
113