Security Analyst 2 at Netskope
1
Talks Delivered
1
Events Spoken At
1
Countries Visited
1
Years Speaking
1
Total Talks Given
Areas of Expertise
Presentation Types
Audience Types
IOCTL-hammer is a lightweight fuzzing harness designed for efficient and targeted security auditing of Windows driver IOCTL interfaces. This tool addresses the high barrier to entry for kernel driver testing by providing a simple, accessible framework that focuses on the most common vulnerability patterns: buffer mismanagement. Rather than relying on complex, coverage-guided instrumentation, ioctl-hammer adopts a parameter-centric methodology, systematically manipulating the four core user-mode buffer descriptors sent via DeviceIoControl.
The fuzzer executes a structured, predefined suite of test cases designed to stress boundary conditions, null parameter handling, and size discrepancies. Despite its simplicity, this focused approach has proven highly effective in real-world testing against proprietary Windows drivers, successfully uncovering multiple zero-day vulnerabilities including a kernel-to-user heap overflow, Denial of Service vulnerabilities and Direct BSODs. IOCTL-hammer is designed for security engineers and researchers to quickly perform initial vulnerability assessments on IOCTLs, find low-hanging fruit, and validate findings without requiring extensive setup or kernel debugging expertise for initial discovery.
Insights from Audience
https://blackhat.com/eu-25/arsenal/schedule/index.html?track[]=exploitation-and-ethical-hacking#ioctl-hammer---parameter-centric-ioctl-fuzzer-for-windows-drivers-48502