Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.

ProPDF
Malware Analysis
hardReconstruct a malicious PDF attack chain by analyzing embedded JavaScript, extracting the PE payload, identifying Windows API calls, and uncovering the C2 server and downloaded file.

TeamSpy
Endpoint Forensics
hardReconstruct the attack timeline by analyzing memory dumps and suspicious document files using Volatility, OfficeMalScanner, and VirusTotal.

PwnedDC - FIN7
Endpoint Forensics
hardLearn to investigate a domain controller compromise by analyzing logs, memory, and artifacts to uncover attacker tactics, persistence methods, and the full intrusion timeline.

$tealer
Malware Analysis
hardReverse engineer advanced stealer malware, identifying PE structure, dynamic API resolution, anti-analysis techniques, and RC4 string decryption to extract C2 IOCs using IDA Pro and CAPA.

LTE Fallen Wall
Threat Hunting
hardReconstruct a Diameter signaling attack on an LTE core network using Kibana to identify 2FA bypass and unauthorized transactions.

NukeTheBrowser
Network Forensics
hardAnalyze network traffic, deobfuscate JavaScript, and examine shellcode to reconstruct a drive-by download attack chain, identifying malware, exploits, and attack methodology using Wireshark and forensic tools.

BankingTroubles
Endpoint Forensics
hardEvaluate a memory image using Volatility and forensic tools to reconstruct the attack chain initiated by a malicious PDF with JavaScript.

Boss Of The SOC v3
Threat Hunting
hardApply Splunk search queries to extract information and answer questions from provided log data.

Boss Of The SOC v2
Threat Hunting
hardApply Attack-Based Hunting methodology using Splunk to analyze and correlate diverse network and host logs, identifying multiple distinct cyberattack scenarios.

Ignoble Scorpius APT
Threat Hunting
insaneApply Attack-Based Hunting principles to Splunk logs, correlating Windows and Sysmon data to identify and reconstruct a multi-stage ransomware attack.