Ring Ø Labs

Search This Blog

Ring Ø Labs DOES NOT advocate using any of the malware, techniques, or information presented here for harm and doing so may violate the law. These topics are for mitigation and educational purposes only. We also employ browser mining to reduce the need for ADs. Read more about us here

Sunday, January 14, 2018

Reverse Engineering and Debugging 3rd Party APKs

 Today we demonstrate how to reverse engineer 3rd party APKs, what tools are needed, and how to debug them without having source-code.



Wednesday, December 20, 2017

Malicious Link Files

Malware authors are implementing malicious link files into their campaigns more and more. This analysis video will detail how to quickly analyze two different types.


Thursday, September 21, 2017

Triaging Malicious Word Document


Today we show how to quickly triage a malicious word document rigged with a VBS downloader and obfuscated Powershell.



Saturday, September 9, 2017

Triaging Java JAR Files

Today we show how to quickly triage Java JAR files with a simple, free, and straightforward Java decompiler.





Thursday, August 31, 2017

Worms Caught In Brambuls

Today we analyze an SMB worm that uses GMAIL for C&C checkins and drops a backdoor on infected machines.





Saturday, August 26, 2017

Large Victim Credential Server Uncovered

A seemingly normal PDF Phishing campaign leads to a very large victim credential server.