Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
PacketMaze
Network Forensics
mediumAnalyze network traffic using Wireshark to identify suspicious activity, extract IOCs, and uncover authentication details, file transfers, and server information across multiple protocols.
Brave
Endpoint Forensics
mediumInvestigate Windows memory images using Volatility3, PowerShell, and a hex editor to extract system artifacts, analyze processes, network connections, and reconstruct user activity.
AfricanFalls
Endpoint Forensics
mediumReconstruct a suspect's digital activities and intent by analyzing browser history, system artifacts, deleted files, and credentials from a disk image using various forensic tools.
DumpMe
Endpoint Forensics
mediumAnalyze memory dumps using Volatility 2 to identify Meterpreter malware and extract Indicators of Compromise.
HireMe
Endpoint Forensics
mediumAnalyze a disk image to investigate multiple forensic cases by examining registry, event logs, and email artifacts using specified forensic tools.
Phishy
Endpoint Forensics
mediumReconstruct an end-to-end phishing attack chain by analyzing disk image, registry, application, and browser artifacts using various forensic tools.
Injector
Endpoint Forensics
mediumDetermine the web server compromise method and attacker actions by analyzing disk images, memory dumps, and registry artifacts using Autopsy, Volatility, and Registry Explorer.
Emprisa Maldoc
Malware Analysis
mediumReconstruct fragmented shellcode from a malicious RTF document and emulate its execution using `rtfdump.py` and `scdbg` to identify CVE-2017-11882 payload delivery.
XLM Macros
Malware Analysis
mediumAnalyze Excel 4.0 macros using XLMDeobfuscator and OLEDUMP to identify anti-analysis techniques and subsequent stage download attempts.
Qradar101
Threat Hunting
mediumAnalyze diverse log sources in QRadar SIEM to identify compromised systems, detect malicious tools, and reconstruct the sequence of attack events.









