
About Me
Hello, my name is Elliot Chernofsky. Since this is an "About Me" section, I should probably share a little bit about myself!
Growing up, I always had a passion for science and technology, and after many many years of hard work and studying, I am finally working in a field that I have a huge passion for, Computer Science and Cybersecurity. In my spare time (if I can ever find any...) I enjoy delving into new fields of research and seeing the results and impact of my experiments. I prefer to know all of the "why" behind things rather than just being told something is because it is.
I began my undergraduate studies at The University of South Florida in Tampa, Florida, with a major in Electrical Engineering. During my time there, I joined the computer security club (WCSC) out of interest in the topic and recommendation from a friend. It was there that I discovered the field that I currently work in and have spent many countless hours trying to get better at. This field is known as Vulnerability Research and Reverse Engineering. I have also found great joy in Reverse Engineering Malware and Exploit Development!
I then began my graduate studies at Georgia Tech with a major in Computer Science, as well as become a full time Vulnerability Researcher and CNO Developer. I also serve in the Air National Guard as a Cyber Warfare Officer, doing mostly CNO Dev and Malware Reverse Engineering, as well as server as a Board Member and Mentor of Veteran Security (VetSec), a group that is geared towards helping military members and veterans get into or progress further in the Cybersecurity field. Check us out here and if you are a member or veteran of the military and interested in joining, and be sure to check out our slack!
I have written a few other blog posts that cover topics such as: Vulnerability Research, Reverse Engineering, Exploit Development, Computer Architecture, and Programming. These posts can be viewed here.
These are mostly introductory posts that will be expanded as time goes on, and are currently written to help someone with very little knowledge in the field be able to get their feet wet.

This walkthrough will give a light background to some basic reverse engineering techniques that would help with CTF challenges.

This is the a series of blog posts which I began to help someone get into the field of Vulnerability Research and also teach a bit of basic exploitation basics.

I have created and hosted a couple of fun Reverse Engineering challenges for the Bitcamp2019 hackathon on my Github, which you can find here.
I hope to have a couple more added before the end of the event as well as some Exploitation challenges as well!
If you are able to solve any of the challenges, see me at my Bitcamp Booth or shoot me an email!

In an effort to gain a better understanding of Vulnerability Research, I have recently begun creating a tutorial and challenge based VM that will teach the basics of Exploitation, Reverse Engineering, and Linux Fundamentals. I am currently looking to expand this work by collaborating with others who have prior experience with creating tutorials or CTFs to help bring this project to light.
The source code can be found here.
Tutorials and Blog Posts can be found here.

