Profile cover photo
Profile photo
Ring Zero Labs
1 follower -
Reverse Engineering
Reverse Engineering

1 follower
About
Posts

Post has attachment
Ring Ø Labs how to analyze CVE 2017-11882 Microsoft Office Equation Editor Buffer Overflow. We also touch on three distinct methods to debug problematic programs using assembly-fu, registry hacks, and gflag magic. https://www.ringzerolabs.com/2018/05/analysis-cve-2017-11882-microsoft.html #malware #cybersecurity #infosec #news #hacking
Add a comment...

Post has attachment
The ever growing Internet of Things (IOT) brings with it a new wave of malware geared toward unfamiliar architectures. Today we take a look at how to compile, analyze, and debug MIPS based binaries.
Add a comment...

Post has attachment
Add a comment...

Post has attachment
Reverse Engineering and Debugging 3rd Party APKs
Add a comment...

Post has attachment
Ring Ø Labs #malware Analysis for Malicious Link Files http://bit.ly/2kW6BvN #cybersecurity #infosec #news #hacking
Photo
Add a comment...

Post has attachment
Today we show how to quickly triage a malicious word document rigged with a VBS downloader and obfuscated Powershell.
Add a comment...

Post has attachment
Today we show how to quickly triage Java JAR files with a free and straightforward Java decompiler.
Triaging Java JAR Files
Triaging Java JAR Files
ringzerolabs.com
Add a comment...

Post has attachment
Today we analyze an SMB worm that uses GMAIL for C&C checkins and drops a backdoor on infected machines.
Worms Caught In Brambuls
Worms Caught In Brambuls
ringzerolabs.com
Add a comment...

Post has attachment
Large Victim Credential Server Uncovered Via Emotet Phishing Campaign
Add a comment...

Post has attachment
Today we analyze a malicious HTML document that claims the user must download a compatibility plugin in order to view the UPS receipt. This is ultimately a Locky Downloader.
Add a comment...
Wait while more posts are being loaded