Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
PhishStrike
Threat Intel
mediumAnalyze email headers and threat intelligence to identify phishing indicators, malware persistence, and C2 channels, extracting actionable IOCs.
Trigona Ransomware - Water Ungaw
Endpoint Forensics
mediumLearn to investigate ransomware attacks by analyzing logs, registry entries, and artifacts to trace attacker actions, tools used, and identify indicators of compromise.
AgentTesla
Malware Analysis
mediumLearn to analyze and dissect Agent Tesla malware by unpacking, identifying embedded scripts, tracing data exfiltration, detecting persistence mechanisms, and understanding anti-VM evasion techniques.
IcedID 2 - GOLD CABIN
Endpoint Forensics
mediumAnalyze memory artifacts and trace a ransomware attack's origin, execution, and persistence using forensic tools like Volatility 3 and MemProcFS.
ATMii
Malware Analysis
mediumUnderstand and analyze ATM-targeting malware using static analysis tools, identify malicious behaviors, and trace how malware exploits legitimate APIs like XFS to manipulate ATM hardware and perform unauthorized actions.
BlueSky Ransomware
Network Forensics
mediumReconstruct a BlueSky ransomware attack by analyzing network traffic, decoding PowerShell scripts, and examining persistence mechanisms to identify attacker tactics and IOCs.
AsyncRAT
Malware Analysis
mediumThis lab aims to equip learners with practical skills in malware analysis by dissecting a multi-stage AsyncRAT infection. Participants will explore obfuscation techniques, payload extraction, persistence mechanisms, and steganographic methods used in real-world malware, enhancing their ability to detect, analyze, and respond to complex cyber threats.
Malicious PyPi
Endpoint Forensics
mediumPerform forensic analysis on a compromised Windows system to identify malware, trace attacker activity, and understand persistence mechanisms.
ConfluenceRCE
Endpoint Forensics
mediumInvestigate a real-world cyberattack, identify compromise indicators, trace attacker activities, and apply forensic and threat intelligence techniques.
Trickbot - WIZARD SPIDER
Threat Intel
mediumDevelop threat intelligence skills by analyzing malware behavior, identifying attack techniques, and uncovering command-and-control infrastructure.









