Ring Ø Labs

Search This Blog

Ring Ø Labs DOES NOT advocate using any of the malware, techniques, or information presented here for harm and doing so may violate the law. These topics are for mitigation and educational purposes only. We also employ browser mining to reduce the need for ADs. Read more about us here

Tuesday, March 6, 2018

Metasploit - Some Assembly Required

Metasploit is the most prevalent exploit framework in the world today thanks to it's ease of use, support, and scalability. Today we focus on payload generation and how some "assembly" may be required. (Pun Intended)

Sunday, January 14, 2018

Reverse Engineering and Debugging 3rd Party APKs

 Today we demonstrate how to reverse engineer 3rd party APKs, what tools are needed, and how to debug them without having source-code.

Wednesday, December 20, 2017

Malicious Link Files

Malware authors are implementing malicious link files into their campaigns more and more. This analysis video will detail how to quickly analyze two different types.

Thursday, September 21, 2017

Triaging Malicious Word Document

Today we show how to quickly triage a malicious word document rigged with a VBS downloader and obfuscated Powershell.

Saturday, September 9, 2017

Triaging Java JAR Files

Today we show how to quickly triage Java JAR files with a simple, free, and straightforward Java decompiler.

Thursday, August 31, 2017

Worms Caught In Brambuls

Today we analyze an SMB worm that uses GMAIL for C&C checkins and drops a backdoor on infected machines.