← All talks

Reverse Engineering Windows Drivers With IOCTLs #shorts

BSides Frankfurt0:40308 viewsPublished 2026-01Watch on YouTube ↗
About this talk
IOCTLs are commonly used for driver communication. Reverse engineer any driver, and you'll likely find a similar structure to this one. Understand IOCTLs for deeper system insights. #Bsidesfrankfurt #Bsides #Bsidesfra #Juansacco
Show transcript [en]

One example is the use of IOCTLs. There are other alternatives to using IOCTLs like share memory if you are into drivers. But IOCTL is something that you you use typically to communicate with the driver. There are other ways but typically you will find the same structure. What it means is that if you grab any driver, so if you go system 32 drivers and you grab any of those drivers in your machine and you putting into IDA or gyra and you the compile the code, you will see something similar. The structure will be similar to the one I have here of this driver that I just made. So uh the structure is going to be like