OFFICIAL SITE OF EMTULS

Exploring the Depths of Computers and Electronics

About Me

Hello, my name is Elliot Chernofsky. Since this is an "About Me" section, I should probably share a little bit about myself!

 

Growing up, I always had a passion for science and technology, and after many many years of hard work and studying, I am finally working in a field that I have a huge passion for, Computer Science and Cybersecurity. In my spare time (if I can ever find any...) I enjoy delving into new fields of research and seeing the results and impact of my experiments. I prefer to know all of the "why" behind things rather than just being told something is because it is.

I began my undergraduate studies at The University of South Florida in Tampa, Florida, with a major in Electrical Engineering. During my time there, I joined the computer security club (WCSC) out of interest in the topic and recommendation from a friend. It was there that I discovered the field that I currently work in and have spent many countless hours trying to get better at. This field is known as Vulnerability Research.

I have since begun my graduate studies at The Georgia Institute of Technology with a major in Computer Science, as well as become a full time Vulnerability Researcher. I also serve in the Air National Guard as a Cyber Warfare Officer, as well as a Board Member of Veteran Security (VetSec), a group that is geared towards helping military members and veterans get into or progress further in the Cybersecurity field. Check us out here and if you are a member of the military and interested in joining, check out our slack!

 

MY RESEARCH AND PROJECTS

 

I have written a few other blog posts that cover topics such as: Vulnerability Research, Reverse Engineering, Exploit Development, Computer Architecture, and Programming. These posts can be viewed here.
 

These are mostly introductory posts that will be expanded as time goes on, and are currently written to help someone with very little knowledge in the field be able to get their feet wet.

Glowing Keyboard

This walkthrough will give a light background to some basic reverse engineering techniques that would help with CTF challenges.

reaper.png

This is the a series of blog posts which I began to help someone get into the field of Vulnerability Research and also teach a bit of basic exploitation basics.

I have created and hosted a couple of fun Reverse Engineering challenges for the Bitcamp2019 hackathon on my Github, which you can find here.

I hope to have a couple more added before the end of the event as well as some Exploitation challenges as well!

If you are able to solve any of the challenges, see me at my Bitcamp Booth or shoot me an email!

In an effort to gain a better understanding of Vulnerability Research, I have recently begun creating a tutorial and challenge based VM that will teach the basics of Exploitation, Reverse Engineering, and Linux Fundamentals. I am currently looking to expand this work by collaborating with others who have prior experience with creating tutorials or CTFs to help bring this project to light.

The source code can be found here.

Tutorials and Blog Posts can be found here.

zeroday.png
 

CONTACT ME

Washington, DC, USA

Blue Keyboard

©2020 by Emtuls