Skip to content
Nullcon Goa

A Systematic Approach for Vulnerability Hunting


Course

Priyanshu Sharma of MIT Pune walks through a five-step driver vulnerability pipeline that moves beyond fuzzing to produce consistent zero-day discoveries.

Driver vulnerabilities are among the most powerful targets in offensive security; yet most researchers rely on random fuzzing that yields inconsistent results. This session introduces a structured five-step methodology for hunting driver bugs that moves beyond the "fuzz and hope" approach, combining mass collection, API filtering, device verification, static analysis and guided fuzzing into a repeatable pipeline.

 

This session, led by Priyanshu Sharma of MIT Pune, will cover:

  • How to filter thousands of drivers down to a shortlist of high-value targets using import table analysis and device verification;
  • How to navigate dispatch tables and IRP major functions in Ghidra to identify dangerous IOCTL handlers;
  • How the pipeline was applied in practice, resulting in the discovery of four zero-days, including CVE-2025-60419.
 

 

Here is the course outline:

Demystifying Driver Research: A Systematic Approach for Vulnerability Hunting

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate

Floating Button