Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.

RotaJakiro
Malware Analysis
hardReverse engineer and analyze RotaJakiro Linux malware using Ghidra, strace, and Wireshark to identify persistence, anti-analysis, and C2 mechanisms.

TOCTOU - OilRig
Endpoint Forensics
hardCorrelate memory, registry, and filesystem artifacts using Volatility 3, MemProcFS, and Timeline Explorer to reconstruct a multi-stage attack timeline and map attacker TTPs to MITRE ATT&CK.

BlackSuit Ransomware
Malware Analysis
hardReconstruct BlackSuit ransomware's attack lifecycle by analyzing PE artifacts, encrypted payloads, API calls, and network communication using Ghidra, x64dbg, and CFF Explorer.

Midnight RDP
Threat Hunting
hardReconstruct a sophisticated intrusion's timeline by correlating Windows Event, Sysmon, and PowerShell logs in Splunk, identifying RDP-based initial access, persistence, privilege escalation, and C2.

SolarDisruption
Network Forensics
hardInvestigate PLC network traffic and system logs to identify insider manipulation attempts and determine the cause of the solar panel disruption at AetherCore Technologies.

XZBackDoor
Endpoint Forensics
hardInvestigate a Linux server compromise by analyzing the XZ backdoor, web shell, log data, and OSINT to uncover attacker TTPs and extract critical IOCs.

SpottedInTheWild
Endpoint Forensics
hardReconstruct an attack timeline by analyzing disk images, event logs, and malicious scripts to identify initial access, persistence, and data exfiltration techniques.

ProPDF
Malware Analysis
hardReconstruct a malicious PDF attack chain by analyzing embedded JavaScript, extracting the PE payload, identifying Windows API calls, and uncovering the C2 server and downloaded file.

OceanLotus
Malware Analysis
hardAnalyze a memory dump using forensic techniques to identify artifacts from a spear-phishing attack and trace its origin.

ProxyLogon - HAFNIUM
Threat Hunting
hardInvestigate SIEM logs using GrayLog to identify indicators of compromise associated with the ProxyLogon vulnerability (CVE-2021-26855).