Tech Talent Investment Program (TTIP) https://cybersecurity.sitemasonry.gmu.edu/ en Cyber savant hacks his way onto international team https://cybersecurity.sitemasonry.gmu.edu/news/2024-12/cyber-savant-hacks-his-way-international-team <span>Cyber savant hacks his way onto international team</span> <span><span lang="" about="/user/431" typeof="schema:Person" property="schema:name" datatype="">Nathan Kahl</span></span> <span>Tue, 12/03/2024 - 11:48</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span><span><span><span><span><span class="intro-text">Dylan Victor Knoff is president of the <a href="https://competitivecyber.club" title="MCC">Mason Competitive Cyber (MCC) club</a>, a computer science major, and the kind of self-motivated hacker you might see rummaging through Goodwill bins, in his free time looking for a $4 router that he can use to bolster his resume.</span> </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><strong>“</strong>I’ll pull it apart and take the firmware off the chip. It's good fun, responsibly and ethically doing stuff to it, of course, and then reporting vulnerabilities,” he said. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>The George Mason University junior likes to examine routers because they are more likely than other devices to have detectable problems. Once he finds a vulnerability, per industry practice, he reports it to the vendor and then <a href="https://www.mitre.org" title="MITRE">MITRE</a>, the nonprofit that that catalogs firmware and software problems. Getting a mention on their common vulnerabilities and exposures listing looks good professionally for young cyber sleuths. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>This ambition to make the cyber world a better, safer place is a theme in Knoff’s life. First, he started a Capture the Flag (CTF) team during high school, and then he attended a university cyber club while still a teen. When the Orlando native and first-gen college student could have chosen the local University of Central Florida, instead he left home for George Mason, recognizing the university’s prowess in the field and the benefit of being close to potential employers in the Washington, D.C., metropolitan region. Knowing that breaking into cybersecurity is no Mickey Mouse endeavor, shortly after arriving in Fairfax he networked with the <a href="https://www.battelle.org" title="Battelle">Battelle</a> intern coordinator and subsequently landed a paid, full-time co-op with the STEM giant. </span></span></span></span></span></span></span></p> <figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq266/files/styles/small_content_image/public/2024-12/screen_shot_2024-12-03_at_11.56.00_am.png?itok=ypJgkMb6" width="330" height="350" alt="Young man stands on a rocky trail" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>When he's not hacking routers, Knoff enjoys Shenandoah National Park</figcaption></figure><p><span><span><span><span><span><span><span>Knoff is on the U.S. Cyber Team and in October competed at the International Cybersecurity Challenge in Santiago, Chile. He said, “We competed against other countries’ teams in a two-day CTF, where one day was attack-and-defend, and the second day was on vulnerability assessment and exploit development.”</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Knoff’s research focus is reverse engineering and vulnerability research. “I'll find something wrong with a specific device or framework and I'll find a ‘zero day,’ which is a vulnerability that is unknown to the vendor, and then I'll disclose it to them,” he said, indicating the standard industry practice. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>For next year’s <a href="https://www.districtcon.org" title="District Con">DistrictCon</a>, a hacker conference in Washington, D.C., in February, Knoff and two members of MCC participated in the Junkyard Contest, where participants find vulnerabilities in devices; they discovered a stunning eight zero days on one router. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Knoff is giving a separate talk at the conference, on return-oriented programming, a way that hackers can get into a system by reusing code that already exists in a program. “I made this tool that utilizes computer emulation to analyze and visualize the memory side effects of elements that make up a return-oriented attack. Using data aggregation, these elements are then sorted based on their exploitation effects and made easily searchable to an operator.” He made the<strong> </strong>tool open source, available to anyone on GitHub, and is releasing an updated version the day of the talk.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>On rare days when he’s not at a keyboard, Knoff enjoys getting outside, especially for a hike. “I love going to Shenandoah with my friends, doing Old Rag and White Oak,” he said, referencing two of the more popular—and challenging—Shenandoah National Park trails. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Currently he’s entertaining offers for two new co-ops, with the hopes of potentially spinning one of those into full-time employment. And whether scaling digital peaks or the rugged trails of Shenandoah, Knoff will find himself climbing…toward discovery and solutions in a safer cyber world.</span></span></span></span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/116" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/511" hreflang="en">Mason Competitive Cyber</a></div> <div class="field__item"><a href="/taxonomy/term/601" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/891" hreflang="en">Tech Talent Investment Program (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/361" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Tue, 03 Dec 2024 16:48:51 +0000 Nathan Kahl 836 at https://cybersecurity.sitemasonry.gmu.edu