Ring Ø Labs

Ring Ø Labs DOES NOT advocate using any of the malware, techniques, or information presented here for harm and doing so may violate the law. These topics are for mitigation and educational purposes only. Read more about us here

Saturday, May 26, 2018

Analysis CVE-2017-11882 Microsoft Equation Editor Exploit

Today's video covers how to analyze CVE 2017-11882 Microsoft Office Equation Editor Buffer  Overflow. We also touch on three distinct methods to debug problematic programs using assembly-fu, registry hacks, and gflag magic.

Saturday, March 31, 2018

The Wonderful World of MIPS

The ever growing Internet of Things (IOT) brings with it a new wave of malware geared toward unfamiliar architectures. Today we take a look at how to compile, analyze, and debug MIPS based binaries.

Tuesday, March 6, 2018

Metasploit - Some Assembly Required

Metasploit is the most prevalent exploit framework in the world today thanks to it's ease of use, support, and scalability. Today we focus on payload generation and how some "assembly" may be required. (Pun Intended)

Sunday, January 14, 2018

Reverse Engineering and Debugging 3rd Party APKs

Today we demonstrate how to reverse engineer 3rd party APKs, what tools are needed, and how to debug them without having source-code.

Wednesday, December 20, 2017

Malicious Link Files

Malware authors are implementing malicious link files into their campaigns more and more. This analysis video will detail how to quickly analyze two different types.

Thursday, September 21, 2017

Triaging Malicious Word Document

Today we show how to quickly triage a malicious word document rigged with a VBS downloader and obfuscated Powershell.