Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.

Maromafix Falldown - RansomHub
Threat Hunting, Endpoint Forensics
hardReconstruct a multi-stage ransomware attack by correlating Windows event logs, disk artifacts, and malware analysis using Elastic, MFTECmd, RegRipper, and DNSpy.

MarkShell - TA577
Threat Hunting
hardInvestigate a multi-stage phishing intrusion from initial access through domain compromise, persistence, and C2 deployment.

Code Blue - APT29
Cloud Forensics
hardReconstruct a multi-stage APT29 intrusion by analyzing Azure and M365 logs to trace device code phishing, OAuth token abuse, service account chaining, Silver SAML forgery, and PHI exfiltration.

Recruiter - Hanoi Op
Endpoint Forensics
hardWhen a "candidate" submits a resume that’s more than it seems, it’s up to you to hunt through the artifacts, reconstruct the infection chain, and stop a data breach in its tracks.

RoastToRoot
Network Forensics
hardAnalyze network traffic to reconstruct a complete domain compromise attack chain, from AS-REP Roasting and Kerberoasting through privilege escalation, lateral movement, and data exfiltration using rclone.

LFI Escalation
Endpoint Forensics

Raining Dinosaurs - Storm-2603
Threat Hunting
hardHunt through Splunk logs to uncover how attackers exploited a DMZ server, pivoted to the internal network, and deployed ransomware after exfiltrating sensitive data.

Latrodectus – LunarSpider
Threat Hunting
hardCorrelate Splunk Sysmon logs and disk forensic artifacts across multiple hosts to reconstruct a multi-stage Latrodectus malware intrusion from initial access to data exfiltration.

RansomHub
Threat Hunting
hardReconstruct RansomHub ransomware attack chain by correlating Splunk logs and disk artifacts to identify password spray, lateral movement, data exfiltration, and ransomware deployment tactics.

Spooler - APT28
Endpoint Forensics
hardHunt browser downloads, MFT records, and Prefetch to unmask the initial dropper and rebuild the attack timeline.

BlackSuit APT Breach
Threat Hunting

Zoom Incident - Ignoble Scorpius APT
Threat Hunting
hardCorrelate Sysmon events and forensic artifacts across multiple hosts using Splunk to reconstruct a full ransomware kill chain, from initial compromise to domain-wide impact.

YARA Trap
Endpoint Forensics
hardInvestigate attacker behavior by analyzing Windows artifacts to identify persistence, privilege escalation, and lateral movement using MFTECmd, PECmd, BitsParser, and registry analysis tools.

Voldemort - APT41
Threat Hunting
hardSynthesize disparate forensic artifacts across email, network, and host logs to reconstruct a multi-stage phishing, malware, and C2 attack, attributing it to a known campaign.

RepoReaper - Water Curse
Endpoint Forensics
hardInvestigate a disk image to uncover a UAC bypass and process hollowing and trace the attack back to a compromised software repository.

GateBreak
Endpoint Forensics
hardReconstruct a macOS attack timeline by correlating Unified Logs, FSEvents, and browser artifacts using macMRU.py and unifiedlog_iterator to identify initial access, Gatekeeper bypass, and persistence.

TomCracked
Network Forensics
hardAnalyze a web server compromise by analyzing network traffic to trace a Java deserialization exploit and the subsequent deployment of a Cobalt Strike beacon.

Rilide
Malware Analysis
hardReconstruct Rilide browser extension attack mechanisms by deobfuscating JavaScript, analyzing Chrome extension artifacts, and leveraging OSINT to identify persistence, C2, and exfiltration IOCs.

RotaJakiro
Malware Analysis
hardReverse engineer and analyze RotaJakiro Linux malware using Ghidra, strace, and Wireshark to identify persistence, anti-analysis, and C2 mechanisms.

TOCTOU - OilRig
Endpoint Forensics
hardCorrelate memory, registry, and filesystem artifacts using Volatility 3, MemProcFS, and Timeline Explorer to reconstruct a multi-stage attack timeline and map attacker TTPs to MITRE ATT&CK.