John U's Avatar

John U

@jdu2600.bsky.social

He/him. Security Research Engineer @ Prelude Research.

43 Followers  |  155 Following  |  23 Posts  |  Joined: 20.11.2024  |  2.3369

Latest posts by jdu2600.bsky.social on Bluesky

Post image

Weโ€™re trying something new.

www.preludesecurity.com/runtime-memo...

31.07.2025 10:59 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

The Security Conversation - The value of offensive security work is fully realized by participation in the security conversation.

aff-wg.org/2025/03/13/t...

14.03.2025 02:51 โ€” ๐Ÿ‘ 11    ๐Ÿ” 5    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Preview
Writing Windows Unit Tests: Telemetry bugs are security vulnerabilities too BSides Canberra 2025 With the introduction of Kernel Patch Protection, Microsoft created a shared responsibility model where security vendors are now limited to only the kernel visibility and extension points that Microso...

"Writing Windows Unit Tests: Telemetry bugs are security vulnerabilities too"
John Uhlmann reveals how flaws in Windows kernel telemetry can hide security risks, and why unit tests help fix them.
Details: cfp.bsidescbr.com.au/bsides-canbe...

22.07.2025 04:50 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Has this episode been published yet?

The Airlock Digital interviews are the best. ๐Ÿ˜ƒ

09.07.2025 02:54 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Though software bugs are BAU.
So Iโ€™m more interested in who thought it was a good idea to deploy IT EDR on business critical OT systems.

Was this pushed by overly aggressive sales? Or did the CISOs not understand risk?

04.07.2025 01:27 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

You should clarify that it was caused by a bug in their kernel driver that was triggered when they forcibly globally deployed a bad content update with buggy unit testing and no integration testing.

04.07.2025 01:21 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Beacon Object Files โ€“ Five Years Onโ€ฆ When I was active in the red teaming space, one of my stated goals was to act on problems with solutions that would have utility 5-10 years from the time of their release. This long-term thinking wโ€ฆ

Beacon Object Files... Five Years On

aff-wg.org/2025/06/26/b...

I released BOFs with Cobalt Strike 4.1 five years ago. This is some history on the feature and what led to it. My thinking at the time. A few thoughts on current discourse.

26.06.2025 18:48 โ€” ๐Ÿ‘ 13    ๐Ÿ” 5    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Call Stacks: No More Free Passes For Malware โ€” Elastic Security Labs We explore the immense value that call stacks bring to malware detection and why Elastic considers them to be vital Windows endpoint telemetry despite the architectural limitations.

My final Elastic Security Labs blog -
www.elastic.co/security-lab...

14.06.2025 03:34 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

So, here's a little thread on my new open source project:

The Tradecraft Garden.

tradecraftgarden.org

It's Crystal Palace, an open-source linker and linker script specialized to writing PIC DLL loaders.

And, a corpora of DLL loaders demonstrating design patterns building tradecraft with it.

05.06.2025 14:36 โ€” ๐Ÿ‘ 24    ๐Ÿ” 13    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 2

This is absolute ๐Ÿ”ฅ- and will significantly harden the path to domain admin against common initial access vectors.

Is it looking likely to be the default for existing installs after upgrade, or just for new installs?

21.05.2025 00:44 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Enhance your application security with administrator protection Introduction Administrator protection is a new Windows 11 platform security feature that aims to protect the admin users on the device while still allowing them to perform the necessary functions whic...

We are removing default admin in Windows 11, get your apps ready now

blogs.windows.com/windowsdevel...

19.05.2025 18:11 โ€” ๐Ÿ‘ 38    ๐Ÿ” 20    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 1
Preview
Misbehaving Modalities: Detecting Tools, Not Techniques โ€” Elastic Security Labs We explore the concept of Execution Modality and how modality-focused detections can complement behaviour-focused ones.

ATT&CK never felt quite right to me. I originally thought it was just that the taxonomy was incomplete.

Then Jared Atkinson at @specterops.io framed my misgivings as a missing dimension and it just clicked.

So I explored the concept of Execution Modality -
www.elastic.co/security-lab...

14.05.2025 12:44 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

When are you speaking at AISA PerthSEC though?

14.05.2025 10:01 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

One of the least discussed topics in detection engineering is maintenance. But why is no one talking about this? In this first blog we explore its relevance to #detectionengineering and the paradox that keeps us awake at night. Enjoy!

falconforce.nl/why-is-no-on...

09.05.2025 10:37 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
BSides Canberra - 25-27th September 2025! BSides Canberra 2025 - BSides Canberra is a technical community conference focussing on the deep understanding of cyber security topics.

www.bsidesau.com.au

16.04.2025 14:18 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

I just uploaded slides from an old talk on Windows x64 Stack Walking.

github.com/jdu2600/conf...

13.04.2025 01:43 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

I attended last week's Pall Mall Process conference in Paris.

I wanted to dump a few notes, writing from my perspective as a security researcher, hacker, former entrepreneur, and creator of a well-known C2 platform (one that, importantly, I'm no longer involved with).

07.04.2025 22:21 โ€” ๐Ÿ‘ 4    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Good luck.
The 1.11.0 update did not go well for meโ€ฆ

07.04.2025 13:59 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Thanks for the shoutout to my research and tool!

Just a heads up that Get-InjectedThreadEx.ps1 (2022) was superseded by Get-InjectedThreadEx.exe (2023).

It's faster - and more comprehensive.

19.03.2025 05:22 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
How Australian spies tracked down Russian cyber gang responsible for Medibank data leak

amp.9news.com.au/article/d0bf...

15.02.2025 03:51 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

MITRE is simply a technique taxonomy - it doesn't have a risk overlay.

Too often the industry overfits on 100% coverage rather than cost-effective risk-informed defenses.
It's okay to assess a technique as low risk and to not have specific coverage.

MITRE's biases don't need to be your biases.

06.02.2025 02:24 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
What Makes a โ€œGoodโ€ Detection? Whether youโ€™re a seasoned Detection Engineer or just starting to build out your SIEM, there comes a point where you need to ask yourselfโ€ฆ

๐Ÿ’ฏ "Just because we can write a detection for something, doesnโ€™t mean we should."

infosecwriteups.com/what-makes-a...

06.02.2025 02:20 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Half* of my family read everything in OpenDyslexia.

* No actual dyslexia, and not the half with AuDHD either.

28.01.2025 10:29 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

www.cisa.gov/sites/defaul...

25.01.2025 09:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Isnโ€™t this the audit logging component of secure by design?

25.01.2025 05:08 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
BSides Canberra - 25-27th September 2025! BSides Canberra 2025 - BSides Canberra is a technical community conference focussing on the deep understanding of cyber security topics.

bsidescbr.com.au

23.01.2025 09:39 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Hey @malwaretech.com. I've been loving your recent advocacy on this, and also that from @boblord.bsky.social on what he calls hacklore.

I wonder if should create a Hacklore Wall of Shame to call out the organizations perpetuating these myths.

18.01.2025 02:19 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
BOD 23-02: Mitigating the Risk from Internet-Exposed Management Interfaces | CISA This page contains a web-friendly version of the Cybersecurity and Infrastructure Security Agencyโ€™s Binding Operational Directive 23-02: Mitigating the Risk

Only public facing services need to be on the public internet (aka shodan). For all other services the convenience of being internet facing needs to be weighed against the risk.

CISA gets this.
www.cisa.gov/news-events/...

04.01.2025 03:11 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

So how do we push back on fraud more generally?

It feels like we need improvements in digital identity and signatures.

A few governments have built such ecosystems, but the alternative would be to incentivize industry (esp banks) to do so.

Should banks be liable for invoice fraud?

04.01.2025 02:50 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

๐Ÿ’ฏ

Magic links are the most straight forward recovery mechanism.

Though, for individuals, the security benefits of passkeys are only marginal over browser-generated passwords - so the advice I still give is simply to use a password manager for most sites and use SMS 2FA for your email.

04.01.2025 02:09 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@jdu2600 is following 20 prominent accounts