Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.

Patrick
Endpoint Forensics
hardInvestigate iOS device artifacts using iLEAPP and SQLite Browser to identify anomalous user behavior and potential illicit activity.

TeamSpy
Endpoint Forensics
hardReconstruct the attack timeline by analyzing memory dumps and suspicious document files using Volatility, OfficeMalScanner, and VirusTotal.

PwnedDC - FIN7
Endpoint Forensics
hardLearn to investigate a domain controller compromise by analyzing logs, memory, and artifacts to uncover attacker tactics, persistence methods, and the full intrusion timeline.

DeepDive
Endpoint Forensics
hardAnalyze a memory dump with Volatility to uncover hidden Emotet malware, investigate its code injection, and reconstruct kernel-level evasion tactics like DKOM.

BankingTroubles
Endpoint Forensics
hardEvaluate a memory image using Volatility and forensic tools to reconstruct the attack chain initiated by a malicious PDF with JavaScript.

Boomer - Lazarus Group
Endpoint Forensics
insaneCorrelate diverse forensic artifacts from memory, registry, browser, and NTFS logs using advanced tools like Mimikatz, Ghidra, and CyberChef to reconstruct a complex data breach and C2 infrastructure.