John U (@jdu2600) 's Twitter Profile
John U

@jdu2600

He/him. Security Research Engineer @elasticseclabs

ID: 892839729884004352

linkhttps://github.com/jdu2600 calendar_today02-08-2017 20:09:14

845 Tweet

617 Followers

346 Following

Silvio Cesare (@silviocesare) 's Twitter Profile Photo

Are you an Aussie willing to relocate to Canberra? Can you find bugs and write exploits in embedded devices like we did at pwn2own? If so, apply for a job at InfoSect DM for details.

Alex Ionescu (@aionescu) 's Twitter Profile Photo

It’s wonderful to see what Xeno Kovah and his collaborators have built for the community. I always recommend OST2 for my new hires and other juniors, or just anyone trying to get started on a new topic. The courses are excellent. It’s an honor to sponsor the Windows Security Path

It’s wonderful to see what <a href="/XenoKovah/">Xeno Kovah</a> and his collaborators have built for the community. I always recommend OST2 for my new hires and other juniors, or just anyone trying to get started on a new topic. The courses are excellent. It’s an honor to sponsor the Windows Security Path
FalconForce Official (@falconforceteam) 's Twitter Profile Photo

We have good news for those who missed out on our Advanced Detection Engineering in the Enterprise training at Black Hat US. Our ADE training is coming to Black Hat Asia 2025, in Singapore! Registration is open! Information and registration: blackhat.com/asia-25/traini…

We have good news for those who missed out on our Advanced Detection Engineering in the Enterprise training at Black Hat US. Our ADE training is coming to Black Hat Asia 2025, in Singapore! Registration is open!

Information and registration: blackhat.com/asia-25/traini…
chompie (@chompie1337) 's Twitter Profile Photo

Exciting news! I’m starting X-Force’s new offensive research team (XOR) and hiring a security researcher. Want to work with researchers (like b33f | 🇺🇦✊ and I) to find bugs, exploit popular targets, and share your work? Apply for this unique (remote) role 😊careers.ibm.com/job/21219320/s…

Clement Rouault (@hakril) 's Twitter Profile Photo

In our search for new forensic artifacts at ExaTrack, we sometimes deep dive into Windows Internals. This one is about COM and interacting with remote objects using a custom python LRPC Client. STUBborn: Activate and call DCOM objects without proxy: blog.exatrack.com/STUBborn/

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

Our talk at #BHEU is done! Hope you all enjoyed it. 😉 A detailed blog is on the way, but in the meantime, check out the pre-alpha website worst.fit for early access and the slides! Huge thanks to Black Hat and my awesome co-presenter splitline 👁️🐈‍⬛! 🐈‍

BlueHat IL (@bluehatil) 's Twitter Profile Photo

Behold this magnificent and ridiculously photogenic crew, tasked with choosing the speakers for the upcoming BlueHat IL conference. Ready to wow them with your pitch-perfect abstract? Of course, you do - so why wait, submit it today: microsoftrnd.co.il/bluehatil/home

Behold this magnificent and ridiculously photogenic crew, tasked with choosing the speakers for the upcoming BlueHat IL conference. Ready to wow them with your pitch-perfect abstract? Of course, you do - so why wait, submit it today: microsoftrnd.co.il/bluehatil/home
Josh (@passthehashbrwn) 's Twitter Profile Photo

New blog from me on using CLR customizations to improve the OPSEC of your .NET execution harness. This includes a novel AMSI bypass that I identified in 2023. By taking control of CLR assembly loads, we can load assemblies from memory with no AMSI scan. securityintelligence.com/x-force/being-…

Rachel Tobac (@racheltobac) 's Twitter Profile Photo

The Women In Security and Privacy (WISP) board is coming together to determine our top priorities for 2025 - YOU get to instruct us on what you would like those priorities to be! Need more scholarships, cons, exams/certs, mentors, events, or something else? Tell us your needs! docs.google.com/forms/u/4/d/e/…

offensivecon (@offensive_con) 's Twitter Profile Photo

Yarden Shafir (Yarden Shafir) is back for Offensivecon 2025 🤩 Sign up now to the Windows Internals Training. *Training tickets also guarantee first slots in the waiting list for conference tickets. offensivecon.org/trainings/2025…

Yarden Shafir (<a href="/yarden_shafir/">Yarden Shafir</a>) is back for Offensivecon 2025 🤩

Sign up now to the Windows Internals Training.

*Training tickets also guarantee first slots in the waiting list for conference tickets.

offensivecon.org/trainings/2025…
John U (@jdu2600) 's Twitter Profile Photo

ATT&CK never felt quite right to me. I originally thought it was just that the taxonomy was incomplete. Then Jared Atkinson framed my misgivings as a missing dimension and it just clicked.

Elastic Security Labs (@elasticseclabs) 's Twitter Profile Photo

Dive deep into malware detection with the latest article by John Uhlmann: "Call Stacks: No More Free Passes for Malware." Discover how call stacks provide vital insights into malware behavior. Read more: go.es.io/4kDWjgr

Daniel Schell (@danonit) 's Twitter Profile Photo

David Weston (DWIZZZLE) Greg Linares (Laughing Mantis) Huntress We’ve been trying to join MVI for years, but don’t get accepted because we don’t delete malware from endpoints. Super frustrating. We’re deployed on over a million endpoints and want to stick to best practices.

SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

An increased visibility into threads' call stacks helps with more reliable malware detection. The approach is based on ETW telemetry and module's Export Directory data for information enrichment. A post by John Uhlmann of Elastic Security Labs. Great read! #redteam #blueteam #maldev

An increased visibility into threads' call stacks helps with more reliable malware detection.

The approach is based on ETW telemetry and module's Export Directory data for information enrichment.

A post by John Uhlmann of <a href="/elasticseclabs/">Elastic Security Labs</a>. Great read!

#redteam #blueteam #maldev
Ido Veltzman (@idov31) 's Twitter Profile Photo

I'm happy to finally release NovaHypervisor! NovaHypervisor is a defensive hypervisor with the goal of protecting AV/EDR vendors and crucial kernel structures that are currently uncovered by VBS and PatchGuard. Full explanation below 1/6. github.com/Idov31/NovaHyp…