Jonny Johnson (@jsecurity101) 's Twitter Profile
Jonny Johnson

@jsecurity101

Principal Windows Security Researcher @HuntressLabs | Windows Internals & Telemetry Research

ID: 746411413074116608

linkhttps://linktr.ee/jonny.johnson calendar_today24-06-2016 18:35:23

2,2K Tweet

7,7K Followers

403 Following

SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Excellent post by Johnathan Johnson (Jonny Johnson) on leveraging PLA (Performance Logs and Alerts) DCOM library to get to ETW telemetry remotely. We touched the same topic in our RTO: Evasion course, when TraceDataProvider interface was used to locate a "hidden" SysMon

Excellent post by Johnathan Johnson (<a href="/JonnyJohnson_/">Jonny Johnson</a>) on leveraging PLA (Performance Logs and Alerts) DCOM library to get to ETW telemetry remotely.

We touched the same topic in our RTO: Evasion course, when TraceDataProvider interface was used to locate a "hidden" SysMon
alden (@birchb0y) 's Twitter Profile Photo

excited bc today Huntress is releasing our analysis of a gnarly intrusion into a web3 company by the DPRK's BlueNoroff!! 🤠 we've observed 8 new pieces of macOS malware from implants to infostealers! and they're actually good (for once)! huntress.com/blog/inside-bl…

Andrew (@4ndr3w6s) 's Twitter Profile Photo

Happy to finally share a new blog with Charlie Clark on our work revisiting the Kerberos Diamond Ticket. ✅ /opsec for a more genuine flow ✅ /ldap to populate the PAC 🆕 Forge a diamond service ticket using an ST We finally gave it a proper cut 💎 huntress.com/blog/recutting…

SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Modern lateral movement techniques detection (mainly DCOM/DCE/RPC/RDP) with examples. Some assumptions worth mentioning: visibility into source IP/port/hostname, logon activity, remote process metadata. A blog post by Huntress team. Awesome read, guys!

Modern lateral movement techniques detection (mainly DCOM/DCE/RPC/RDP) with examples.

Some assumptions worth mentioning: visibility into source IP/port/hostname, logon activity, remote process metadata.

A blog post by <a href="/HuntressLabs/">Huntress</a> team. Awesome read, guys!
Melvin langvik (@flangvik) 's Twitter Profile Photo

New video out 😊 showing how you can take control of port 445 and perform those magical relay attacks toward AD CS when working from a C2 agent. Way easier than before thanks to some great research by Nick Powers youtube.com/watch?v=e4f3h5…

Pavel Yosifovich (@zodiacon) 's Twitter Profile Photo

Enroll now for our 40-hour live workshop “EDR Internals: R&D,” co-taught with Uriel Kosayev. Starts 23 Oct 2025. Dissect & build EDR drivers, master evasion techniques. Early-bird $1,450 ends 30 Sep. Details: trainsec.net/courses/edr-in… #EDR #WindowsInternals

Connor McGarr (@33y0re) 's Twitter Profile Photo

I don't know which update specifically, but in a recent update of 24H2 it looks like the Win32k system call table is protected by Kernel Data Protection (read-only SLAT entry)! I believe CI!g_CiOptions and msseccore's SecKdpSe PE section were the only things using it before.

I don't know which update specifically, but in a recent update of 24H2 it looks like the Win32k system call table is protected by Kernel Data Protection (read-only SLAT entry)! I believe CI!g_CiOptions and msseccore's SecKdpSe PE section were the only things using it before.
Wild West Hackin' Fest (@wwhackinfest) 's Twitter Profile Photo

Olaf Hartong is ridin' into Wild West Hackin' Fest - Deadwood 2025 with his talk, "I'm In Your Logs Now, Deceiving Your Analysts and Blinding Your EDR" Don't ya go missin' it, grab yer tickets to the con today: wildwesthackinfest.com/register-for-w… #WWHF #Deadwood2025 #TheFutureIs

<a href="/olafhartong/">Olaf Hartong</a> is ridin' into Wild West Hackin' Fest - Deadwood 2025 with his talk, "I'm In Your Logs Now, Deceiving Your Analysts and Blinding Your EDR" Don't ya go missin' it, grab yer tickets to the con today: wildwesthackinfest.com/register-for-w…

#WWHF #Deadwood2025 #TheFutureIs
Olaf Hartong (@olafhartong) 's Twitter Profile Photo

In about an hour I’ll present my talk I’m in your logs now, deceiving your analysts and blinding your EDR at #BHUSA25 Black Hat in Islander E/I. Come and hang out!

In about an hour I’ll present my talk  I’m in your logs now, deceiving your analysts and blinding your EDR at #BHUSA25 <a href="/BlackHatEvents/">Black Hat</a>  in Islander E/I. Come and hang out!