Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
OpenCTI 101 - APT29
Threat Intel
easyIdentify threat actor TTPs and IOCs for APT29 by navigating and querying the OpenCTI threat intelligence platform.
Tusk Infostealer
Threat Intel
easyAnalyze threat intelligence and malware configuration to identify TTPs, extract IOCs, and track cryptocurrency flow of the Tusk Infostealer campaign.
Red Stealer
Threat Intel
easyAnalyze a suspicious executable using VirusTotal and MalwareBazaar to extract IOCs, identify C2 infrastructure, MITRE ATT&CK techniques, and privilege escalation mechanisms.
3CX Supply Chain
Threat Intel
easyReconstruct the 3CX supply chain attack by analyzing compromised MSI and DLL artifacts to identify TTPs and attribute the incident to a threat actor.
IcedID
Threat Intel
easyInvestigate IcedID malware using VirusTotal and threat intelligence platforms to identify IOCs, associated threat actors, and execution mechanisms.
Oski
Threat Intel
easyAnalyze a sandbox report using Any.Run to identify Stealc malware behavior, extract configuration details, and map observed tactics to MITRE ATT&CK.
Yellow RAT
Threat Intel
easyAnalyze malware artifacts using threat intelligence platforms like VirusTotal to identify IOCs, C2 servers, and understand adversary tactics.
T1584.004
Threat Intel
easyApply MISP to manage security events, create attributes, and integrate threat intelligence from data feeds.
T1583.002
Threat Intel
easyAnalyze a malware campaign using MISP to identify communication patterns and extract key indicators of compromise (IOCs), including malware family and file hashes.
GrabThePhisher
Threat Intel
easyAnalyze a cryptocurrency phishing kit to identify exfiltration methods, extract critical IOCs, and gather threat actor intelligence using local logs and Telegram APIs.
Lespion
Threat Intel
easyInvestigate an insider threat by analyzing GitHub repositories for exposed credentials, using OSINT tools to correlate online accounts, and performing image analysis to identify locations.
RaaS Unfold - RansomHub
Threat Intel
mediumA ransomware empire built on the ashes of its predecessors — trace its origins, expose its operators, and unfold its playbook.
MBuchus
Threat Intel
mediumUtilize OSINT, VirusTotal, and crt.sh to analyze a multi-stage malvertising campaign, identifying initial access, malware payloads, and attacker infrastructure.
BRabbit
Threat Intel
mediumReconstruct a Bad Rabbit ransomware attack chain by analyzing phishing, persistence, and MBR modification using dynamic analysis and MITRE ATT&CK.
PhishStrike
Threat Intel
mediumAnalyze email headers and threat intelligence to identify phishing indicators, malware persistence, and C2 channels, extracting actionable IOCs.
Trickbot - WIZARD SPIDER
Threat Intel
mediumDevelop threat intelligence skills by analyzing malware behavior, identifying attack techniques, and uncovering command-and-control infrastructure.
Intel101
Threat Intel
mediumApply open-source intelligence (OSINT) techniques using Whois, Wayback Machine, and Google Lens to investigate digital footprints and extract specific information.
















