Pandora's Box
About
Archive
Research
About
Archive
Research
Archive
2020
November
Code Note 0x3: DDoS as a Service
2020-11-07
— Written by P. Boonyakarn
October
APT 41 Indictments
2020-10-04
— Written by P. Boonyakarn
iPhone/iOS Anti-Forensics Note
2020-10-02
— Written by P. Boonyakarn
August
Google Technical Writing Course
2020-08-12
— Written by P. Boonyakarn
Ghostwriter Campaign Note
2020-08-12
— Written by P. Boonyakarn
July
Code Note 0x2: ATPMiniDump
2020-07-28
— Written by P. Boonyakarn
Analysis of 45 Million Travelers to Thailand and Malaysia Data Leaked
2020-07-16
— Written by P. Boonyakarn
FIN7 CrimeOps: ศึกษาปฏิบัติการของกลุ่มอาชญากรไซเบอร์ “FIN7” กลุ่มนักล่าระบบ Point of Sale (POS)
2020-07-09
— Written by P. Boonyakarn
Experience and Seniority
2020-07-07
— Written by P. Boonyakarn
June
Unpopular Opinion: On Maze Ransomware
2020-06-18
— Written by P. Boonyakarn
The Incident Response Hierarchy of Needs
2020-06-03
— Written by P. Boonyakarn
May
Code Note 0x1: DeathRansom
2020-05-23
— Written by P. Boonyakarn
April
Problems in CVE-2020-0796 Scanner Scripts
2020-04-04
— Written by P. Boonyakarn
March
Integrating BinExport with GhiDra
2020-03-07
— Written by P. Boonyakarn
February
Enhancing Host File with PortProxy
2020-02-29
— Written by P. Boonyakarn
January
SHA-1 is a Shambles
2020-01-21
— Written by P. Boonyakarn
2019
November
Arbitrary File Write and DiagHub Exploit
2019-11-22
— Written by P. Boonyakarn
Quick Note on Nanocore Tradecraft - A Double ZIP File
2019-11-12
— Written by P. Boonyakarn
October
How to Prepare Before the Compromise - A Summary From BHIS Talk
2019-10-20
— Written by P. Boonyakarn
BHUSA19: Flying A False Flag - Advanced C2, Trust Conflicts, and Domain Takeover
2019-10-14
— Written by P. Boonyakarn
BHUSA19: ClickOnce and You’re In - When Appref-ms Abuse is Operating as Intended
2019-10-14
— Written by P. Boonyakarn
BHUSA19: Worm Charming - Harvesting Malware Lures for Fun and Profit
2019-10-13
— Written by P. Boonyakarn
A Missing of Acrobat API JavaScript
2019-10-11
— Written by P. Boonyakarn
Usage Logging at Internet Cafe
2019-10-10
— Written by P. Boonyakarn
Hunting Attack Campaigns Exploiting VPN Vulnerabilities
2019-10-10
— Written by P. Boonyakarn
Lesson Learned From Australian National University (ANU) Data Breach Incident Report
2019-10-05
— Written by P. Boonyakarn
September
Ask Andrew W.K.: My Dad Is a Right-Wing Asshole
2019-09-10
— Written by P. Boonyakarn
June
Story of Unknown ATM Malware, Thai’s Bank and Attribution
2019-06-27
— Written by P. Boonyakarn
April
Quick Note on Phobos Ransomware
2019-04-11
— Written by P. Boonyakarn
February
Lead by Example Isn’t a Problem
2019-02-26
— Written by P. Boonyakarn
January
Deploy Your Own Local MISP with HTTPS Supported by mkcert
2019-01-19
— Written by P. Boonyakarn
Endpoint Protection, Detection and Response Bypass Techniques Index
2019-01-15
— Written by P. Boonyakarn
2018
December
Understandings on .SettingContent-ms as aื Initial Access Vector
2018-12-29
— Written by P. Boonyakarn
My Forked Version of msfrpc with Python3 Support
2018-12-07
— Written by P. Boonyakarn
Short Summary of NIST SP 800-63B on Strength of Memorized Secrets
2018-12-07
— Written by P. Boonyakarn
Adversary Mindset and Kobayashi Maru Exericse
2018-12-07
— Written by P. Boonyakarn
What Does Nation-State Attacker Looks Like: Russian Tradecraft In 2016 U.S. Elections
2018-12-07
— Written by P. Boonyakarn