Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

NerisBot

PREMIUM

Threat Hunting

easy

Reconstruct the attack timeline by correlating Suricata and Zeek logs in Splunk to identify malicious IPs, C2 domains, targeted hosts, and file hashes.

REvil - GOLD SOUTHFIELD

PREMIUM

Threat Hunting

easy

Analyze Sysmon logs in Elastic SIEM to investigate REvil ransomware attack behaviors, decode recovery sabotage commands, and identify IOCs including the C2 onion domain.

T1110-003

PREMIUM

Threat Hunting

easy

Poisoned PyTorch

PREMIUM

Threat Hunting

medium

Investigate a software supply-chain compromise that escalates into a ransomware attack, with emphasis on identifying pre-encryption operations.

Stolen Time - HiddenTear

PREMIUM

Threat Hunting

medium

Synthesize and correlate diverse forensic artifacts from multiple systems to reconstruct the complete HiddenTear attack chain and attribute threat actor TTPs.

Perfect Survey

PREMIUM

Threat Hunting

medium

Nitrogen - Blackcat Ransomware

PREMIUM

Threat Hunting

medium

Reconstruct multi-stage ransomware attack by correlating Splunk telemetry, disk forensics, and registry artifacts to identify persistence mechanisms, credential dumping, and lateral movement.

StarkTech Incident - APT41

PREMIUM

Threat Hunting

medium

Reconstruct a multi-stage attack timeline by analyzing Sysmon and Windows event logs in Splunk to identify attacker tactics from initial access to data exfiltration.

CredSnare - Angry Likho APT

PREMIUM

Threat Hunting

medium

Correlate Splunk logs and filesystem artifacts from a workstation and domain controller to reconstruct an attack chain involving Kerberos delegation and credential theft.

NetSupport RAT - TA569

PREMIUM

Threat Hunting

medium

Reconstruct a sophisticated attack timeline by analyzing Windows logs, network traffic, and disk artifacts to identify initial access, persistence, and data exfiltration using Splunk and forensic tools.

Rhysida - Vice Society

PREMIUM

Threat Hunting

medium

Reconstruct the Rhysida ransomware attack chain, identifying initial access, persistence, C2, and impact using Splunk and CyberChef.

Black Basta

PREMIUM

Threat Hunting

medium

Correlate Sysmon, Windows event logs, and PowerShell history to reconstruct a multi-stage Black Basta ransomware attack, identifying initial access, persistence, C2, exfiltration, and impact.

LNKTrap

PREMIUM

Threat Hunting

medium

Reconstruct a targeted cyber attack's timeline by analyzing Splunk event logs, process, and network data to identify initial access, persistence, privilege escalation, and C2.

BumbleBee - GOLD CABIN

PREMIUM

Threat Hunting

medium

Correlate Windows event logs and Sysmon data across enterprise systems using ELK to reconstruct a multi-stage cyber attack from initial access to ransomware.

GoldenSpray

PREMIUM

Threat Hunting

medium

Reconstruct a multi-stage intrusion timeline by analyzing Windows and Sysmon event logs within Elastic SIEM to identify key attack tactics, techniques, and procedures.

ShadowRoast

PREMIUM

Threat Hunting

medium

Investigate and analyze malicious activity in an Active Directory environment using log analysis and Splunk queries to identify initial access, persistence, lateral movement, and data exfiltration techniques.

Kerberoasted

PREMIUM

Threat Hunting

medium

Detect, analyze, and respond to Kerberoasting attacks by investigating Kerberos logs, identifying compromised accounts, and uncovering attacker persistence methods.

T1197

PREMIUM

Threat Hunting

medium

Analyze Windows event logs in Splunk to identify T1197 BITS abuse, LOLBAS usage, attacker IP, and persistence mechanisms.

FalconEye

PREMIUM

Threat Hunting

medium

Learn to use Splunk for detecting, analyzing, and investigating cybersecurity threats through log analysis, threat hunting, privilege escalation, lateral movement, and advanced attack techniques.

ElasticCase

PREMIUM

Threat Hunting

medium

Investigate a simulated multi-stage attack to identify compromise and attacker activity using Elastic SIEM.