> whoami

Ishaan Sheth

Systems Hacker & Aspiring Kernel Researcher

Exploiting systems from Ring 3 to Ring 0. Primarily focused on Linux kernel internals and reverse engineering, with cross-platform expertise in Android and foundational Windows user-space architecture.

Ishaan Sheth

00. Background

I am a third-year engineering student at Dwarkadas J. Sanghvi College of Engineering, maintaining a 9.46 CGPA. My journey in cybersecurity started with web vulnerabilities and CTFs, but my true passion lies in the architecture that runs beneath it all.

I have completed an Industry Internship at Deloitte and a Research Internship at VJTI, diving deep into reverse engineering using Ghidra and IDA. My primary research and exploitation focus is on Linux systems and kernel internals. However, my offensive security capabilities are cross-platform, backed by a strong working knowledge of Android architectures and basic user-level Windows fundamentals.

D.J. Sanghvi COE

Computer Engineering

9.46 CGPA

Academic Standing

01. Core Expertise

Linux Kernel Exploitation

Primary focus on Ring 0 vulnerabilities, Local Privilege Escalation (LPE), kernel module analysis, and advanced memory/page table manipulation within custom Linux environments.

pwnCKernelGDB

Android Security & RE

Decompiling and reverse engineering applications. Proficient in dynamic instrumentation, analyzing Dalvik bytecode, bypassing root detection, and exploiting native JNI libraries.

FridaSmaliJadxGephi

Windows Fundamentals

Solid understanding of Windows user-space architecture and the PE file format. Experience with basic reverse engineering of Windows binaries and WinAPI analysis (focused entirely on user-land, pre-kernel level).

PE AnalysisWinAPIUser-land

02. Learning Trajectory

Present

Kernel & Low-Level Exploitation

Currently researching Windows and linux drivers at a lower level and diving deep into Kernel exploitation, IOCTL, and Native APIs.

2025

Reverse Engineering & Linux

Switched completely to Linux (Kali and later Arch). Completed a Research Internship at VJTI in Reverse Engineering and built a web server entirely in x86 Assembly. Mastered tools like Ghidra and IDA.

2024

Cybersecurity & Networks

Familiarized myself with network hacking tools like Scapy, tshark, and Netcat. Gained certifications in Cryptography, Hashing, and Ethical Hacking via Udemy.

2023

Foundations & Web Dev

Started delving into computers and programming. Became a Certified Developer in JavaScript, HTML, and CSS. Developed a strong grasp of C programming and Cookie Management.

03. Core Projects

Meltdown & Page Table Walking

Exploited speculative execution to bypass kernel isolation. Wrote a C tool to manually translate 4-level x86 page tables via side-channels to steal protected memory.

  • C
  • Assembly
  • x86 Architecture

x86 Assembly Web Server

Built a fully functional HTTP server from scratch using pure Intel syntax assembly, handling raw socket connections and GET/POST parsing without high-level abstractions.

  • x86 Assembly
  • Linux Syscalls
  • Networking

Microarchitecture Prefetch Attack

Developed a microarchitectural side-channel exploit targeting CPU prefetch mechanisms. Utilized precise timing analysis in C to infer access patterns and leak memory states.

  • Side-Channel Analysis
  • C
  • CPU Internals

04. Publications & Papers

2026

QVeriSign

Cryptographic Protocol

A highly secure cryptographic protocol leveraging the no-cloning theorem, quantum tokens, and the SWAP test to ensure unforgeable data integrity.

Expected Publication: Fall 2026
2026

Quality Analysis of Borewell Water

AI-ML, IOT

A comprehensive research paper detailing the physical, chemical, and biological quality parameters and safety of borewell water sources.

View Paper
2026

Option pricing prediction using XAI

AI-ML, Finance

We use different ML models to predict Option prices and XAI techniques to explain how the predictions were made

Expected Publication: Fall 2026
2026

CVE-id risk scoring

Cybersecurity, AI-ML

Make use of existing CVE's(Common Vulnerabilities and Exposures) to predict vulnerabilities in a system

Expected Publication: Fall 2026