Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

BlueSky Ransomware

Network Forensics

medium

Reconstruct a BlueSky ransomware attack by analyzing network traffic, decoding PowerShell scripts, and examining persistence mechanisms to identify attacker tactics and IOCs.

AsyncRAT

PREMIUM

Malware Analysis

medium

This lab aims to equip learners with practical skills in malware analysis by dissecting a multi-stage AsyncRAT infection. Participants will explore obfuscation techniques, payload extraction, persistence mechanisms, and steganographic methods used in real-world malware, enhancing their ability to detect, analyze, and respond to complex cyber threats.

Malicious PyPi

PREMIUM

Endpoint Forensics

medium

Perform forensic analysis on a compromised Windows system to identify malware, trace attacker activity, and understand persistence mechanisms.

ConfluenceRCE

PREMIUM

Endpoint Forensics

medium

Investigate a real-world cyberattack, identify compromise indicators, trace attacker activities, and apply forensic and threat intelligence techniques.

Trickbot - WIZARD SPIDER

PREMIUM

Threat Intel

medium

Develop threat intelligence skills by analyzing malware behavior, identifying attack techniques, and uncovering command-and-control infrastructure.

OpenWire

Network Forensics

medium

Investigate a Java deserialization vulnerability in Apache ActiveMQ that enables remote code execution through insecure class loading.

TheTruth

PREMIUM

Endpoint Forensics

medium

Reconstruct an Android attack timeline using forensic artifacts to identify RatMilad malware, extract its C2, and attribute a fraudulent transaction.

QBot

PREMIUM

Endpoint Forensics

medium

Reconstruct the QBot malware infection timeline by analyzing memory dumps, identifying malicious processes, files, and network communications using Volatility3 and VirusTotal.

LockBit

PREMIUM

Endpoint Forensics

medium

Reconstruct a multi-system LockBit ransomware attack chain by correlating Windows event logs, registry artifacts, and PowerShell activity to identify TTPs.

GoogleCloudHunt

PREMIUM

Cloud Forensics

medium

Learn cloud forensics by analyzing Google Cloud logs with JQ to identify compromised accounts, data exfiltration, and attacker persistence methods in a simulated breach scenario.