Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.

ContainerBreak - Rootkit Trail
Endpoint Forensics

Maranhao
Endpoint Forensics
easyInvestigate a trojanized game installer by analyzing browser history, logs, registry hives, and filesystem artifacts to map the full attack chain and extract IOCs.

RevengeHotels APT
Endpoint Forensics
easyReconstruct multi-stage APT attack chain by correlating email, browser, Sysmon logs, and registry artifacts to identify persistence mechanisms and data exfiltration techniques.

Reveal
Endpoint Forensics
easyReconstruct a multi-stage attack by analyzing Windows memory dumps using Volatility 3, identifying malicious processes, command lines, and correlating findings with threat intelligence.

Volatility Traces
Endpoint Forensics
easyAnalyze a memory dump using Volatility to identify malicious processes, persistence mechanisms, defense evasion techniques, and map them to MITRE ATT&CK.

Ramnit
Endpoint Forensics
easyAnalyze a memory dump using Volatility to identify a malicious process, extract network IOCs, file hash, and compilation timestamp, correlating with external threat intelligence.

The Crime
Endpoint Forensics
easyUtilize ALEAPP to analyze Android device artifacts, reconstructing a victim's financial details, movements, and communication patterns.

T1598.002 - Dragonfly
Endpoint Forensics
easyAnalyze a spearphishing email to identify social engineering techniques and extract indicators of compromise from its headers and malicious attachment.

RedLine
Endpoint Forensics
easyEmploy Volatility to analyze a memory dump, identifying suspicious processes, network IOCs, memory protections, and attacker's command-and-control infrastructure.

Insider
Endpoint Forensics
easyAnalyze Linux disk image artifacts, including logs and Bash history, using FTK Imager to investigate insider threat activities and reconstruct user actions.

KioskExpo7
Endpoint Forensics

Famous Chollima
Endpoint Forensics
mediumSynthesize forensic artifacts and Python source code from a disk image to reconstruct a credential theft attack, identifying persistence methods and C2 communications.

BYOD Breach
Endpoint Forensics
mediumCorrelate Android and Windows forensic artifacts, including logs and malware analysis, to reconstruct a multi-stage BYOD breach from initial access to persistence.

Job Trap - OilRig
Endpoint Forensics
mediumAnalyze PowerShell and Sysmon logs to investigate macro-based malware, identify persistence via scheduled tasks, and extract C2 indicators and keylogger behavior using FTK Imager and olevba.

ResourcePacks
Endpoint Forensics
mediumReconstruct an attack timeline by analyzing forensic artifacts to identify a UAC bypass, WMI persistence, and backdoor user creation techniques.

WorkFromHome
Endpoint Forensics
mediumAnalyze forensic artifacts to trace an attacker's progression from initial social engineering and remote access to a "Sticky Keys" privilege escalation.

NetX-Support - TA569
Endpoint Forensics
mediumAnalyze browser, filesystem, and event artifacts to reconstruct the attack chain, identify the malicious download source, extract second-stage and C2 indicators, and determine persistence, account creation, and lateral movement.

Fog Ransomware - Fluttering Scorpius
Endpoint Forensics
mediumReconstruct the Fog ransomware attack chain by analyzing browser, registry, event logs, and MFT artifacts to identify initial access, persistence, BYOVD privilege escalation, and IOCs.

VaultBreak
Endpoint Forensics
mediumReconstruct a multi-stage attack by analyzing Sysmon, WMI, and Prefetch logs to identify initial infection, advanced persistence, and C2 communications.

Silent Breach
Endpoint Forensics
mediumAnalyze a forensic image to extract communication artifacts, identify malware behavior, and decrypt encrypted files using FTK Imager, string analysis, and PowerShell scripting.