Vulnerability Hunting [Training]
Vulnerability Hunting [Training]
Vulnerability Hunting for the Windows Kernel - By Juan Sacco
This training provides a deep, practical introduction to Windows kernel vulnerability hunting, guided by Juan Sacco.
By the end of the course, you’ll understand the full workflow—from identifying vulnerable drivers to reversing and classifying vulnerabilities using industry-standard tools.
What You Will Learn
- PE structure and Windows internals
- Driver internals, architecture, and debugging
- Set up a proper lab environment for driver vulnerability research
- Fuzzing Windows drivers using external tools
- Ghidra and IDA Pro: from zero knowledge to reversing real samples
- Using plugins for enhanced decompilation and reverse engineering
- Analyze samples and understanding vulnerability classes and types
- Exploitation fundamentals and classification
Windows 11 security protections relevant to vulnerability hunting, including:
- KASLR
- Shadow Stack
- SEH
- SMEP/SMAP
- Hypervisor-based protections (VBS / HVCI)
Course Overview
You’ll learn where and how to find real-world samples, how to identify vulnerabilities in Windows drivers, and how to dissect them by classification and type.We’ll slowly walk you through reversing these issues using Ghidra and IDA Pro, supported by dedicated plugins and tooling.
Topics Covered
- Using IDA Pro and Ghidra for vulnerability research
- Reversing PE binaries and WDM drivers
- Exploit types and classification
- Windows 11 exploit mitigations
- Understanding and bypassing driver-level protections
- Filtering, protection, and obfuscation techniques used by software vendors—including IOCTL hiding
Hands-on Exercises & Materials
You will practice against real vulnerable drivers and curated examples, including:
- Instructor-built drivers and applications
- Real-world vendor PoCs and samples
Tools & Resources Provided
Participants receive access to a set of tools used during the course:
- IOCTL++
- DriversHunter app for the Windows Catalog
- IDA and Ghidra debugging plugins
- GUI for IOCTL Lance
- Additional tooling, scripts, and supporting materials
Format & Delivery
- Format: Pre-recorded videos (learn at your own pace)
- Content: 4 video modules + downloadable tools and materials delivered progressively
- Exercises: Fully included
Support & Community
Participants can join our Discord channel #training, where you can:
- Share progress
- Ask questions
- Collaborate with instructors and other learners
Couldn't load pickup availability
![Vulnerability Hunting [Training]](http://www.exploitpack.com/cdn/shop/files/37f310f4-4842-40b7-8343-67ca71955d13.png?v=1764242314&width=1445)