Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

PaloAltoRCE - UTA0218

PREMIUM

Threat Hunting

hard

Reconstruct a Palo Alto RCE attack timeline by analyzing firewall logs in ELK, identifying initial access, reverse shell, persistence, and data exfiltration artifacts.

XZBackDoor

PREMIUM

Endpoint Forensics

hard

Investigate a Linux server compromise by analyzing the XZ backdoor, web shell, log data, and OSINT to uncover attacker TTPs and extract critical IOCs.

OceanLotus

PREMIUM

Malware Analysis

hard

Analyze a memory dump using forensic techniques to identify artifacts from a spear-phishing attack and trace its origin.

ProxyShell

PREMIUM

Network Forensics

hard

Analyze network traffic to identify exploitation attempts targeting the ProxyShell vulnerability and extract relevant indicators of compromise.

ProxyLogon - HAFNIUM

PREMIUM

Threat Hunting

hard

Investigate SIEM logs using GrayLog to identify indicators of compromise associated with the ProxyLogon vulnerability (CVE-2021-26855).

TeamSpy

Endpoint Forensics

hard

Reconstruct the attack timeline by analyzing memory dumps and suspicious document files using Volatility, OfficeMalScanner, and VirusTotal.

PwnedDC - FIN7

PREMIUM

Endpoint Forensics

hard

Learn to investigate a domain controller compromise by analyzing logs, memory, and artifacts to uncover attacker tactics, persistence methods, and the full intrusion timeline.

Boss Of The SOC v3

PREMIUM

Threat Hunting

hard

Apply Splunk search queries to extract information and answer questions from provided log data.

Boss Of The SOC v2

PREMIUM

Threat Hunting

hard

Apply Attack-Based Hunting methodology using Splunk to analyze and correlate diverse network and host logs, identifying multiple distinct cyberattack scenarios.

Ignoble Scorpius APT

PREMIUM

Threat Hunting

insane

Apply Attack-Based Hunting principles to Splunk logs, correlating Windows and Sysmon data to identify and reconstruct a multi-stage ransomware attack.