Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
XWorm
Malware Analysis
mediumAnalyze malware behavior to identify persistence methods, evasion techniques, and C2 infrastructure by extracting artifacts and configuration data from static and dynamic analysis.
Silent Breach
Endpoint Forensics
mediumAnalyze a forensic image to extract communication artifacts, identify malware behavior, and decrypt encrypted files using FTK Imager, string analysis, and PowerShell scripting.
BRabbit
Threat Intel
mediumReconstruct a Bad Rabbit ransomware attack chain by analyzing phishing, persistence, and MBR modification using dynamic analysis and MITRE ATT&CK.
PhishStrike
Threat Intel
mediumAnalyze email headers and threat intelligence to identify phishing indicators, malware persistence, and C2 channels, extracting actionable IOCs.
BlueSky Ransomware
Network Forensics
mediumReconstruct a BlueSky ransomware attack by analyzing network traffic, decoding PowerShell scripts, and examining persistence mechanisms to identify attacker tactics and IOCs.
OpenWire
Network Forensics
mediumInvestigate a Java deserialization vulnerability in Apache ActiveMQ that enables remote code execution through insecure class loading.
KrakenKeylogger
Endpoint Forensics
mediumAnalyze Windows 10 notification artifacts, installed applications, LNK files, and Applications logs to uncover malicious activity and enhance forensic investigation capabilities.
AzurePot
Endpoint Forensics
mediumUnderstand real-world Linux compromise via CVE-2021-41773 by analyzing disk, memory, and system artifacts to identify attacker techniques, persistence methods, and IOCs.
Sysinternals
Endpoint Forensics
mediumConduct endpoint forensic analysis to detect, analyze, and understand malware infections using disk images, registry artifacts, and threat intelligence.
BlackEnergy
Endpoint Forensics
mediumDevelop practical skills in Windows memory forensics using Volatility by detecting malware indicators, analyzing suspicious processes, and identifying code injection and unauthorized DLLs in a compromised system.









