Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
CorporateSecrets
Endpoint Forensics
mediumEvaluate a Windows disk image by correlating registry, event log, browser, and MFT artifacts to reconstruct evidence of corporate secret exfiltration.
RE101
Malware Analysis
mediumAnalyze diverse file types including binaries, obfuscated scripts, and corrupted archives using tools like Cutter, hex editors, and debuggers to extract hidden flags and reverse custom encryption.
WireDive
Network Forensics
mediumAnalyze diverse network traffic using Wireshark to decrypt HTTPS, identify protocol misconfigurations, and extract critical network and system forensic artifacts.
Szechuan Sauce
Endpoint Forensics
mediumReconstruct a data exfiltration incident by correlating memory, disk, network, and log artifacts using a suite of forensic tools.
Hunter
Endpoint Forensics
mediumEvaluate forensic artifacts from a disk image to confirm unauthorized port scanning and assess user intent for installing illegal applications.
EscapeRoom
Network Forensics
mediumReconstruct a multi-stage attack by analyzing network traffic, cracking credentials, and reverse engineering malware using Wireshark, John the Ripper, and IDA Pro to identify persistence and C2 commands.
Malware Traffic Analysis 6
Network Forensics
mediumInvestigate email, document, and network traffic using VirusTotal, oledump, and Wireshark to identify ransomware delivery mechanisms and C2 communications.
Malware Traffic Analysis 5
Network Forensics
mediumInvestigate network traffic using Wireshark, NetworkMiner, and Suricata to identify the specific malicious email responsible for system compromise.
Malware Traffic Analysis 2
Network Forensics
mediumReconstruct an exploit kit attack chain from network traffic, identifying the infected host, extracting malware, and determining the exploited CVE using Wireshark and forensic tools.
Malware Traffic Analysis 1
Network Forensics
mediumAnalyze network traffic using Wireshark to identify an infected host, trace an exploit kit infection chain, and extract malicious URLs and file hashes.









