Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

Amadey - APT-C-36

PREMIUM

Endpoint Forensics

medium

Reconstruct Amadey Trojan behavior by analyzing memory dumps with Volatility3 to identify malicious processes, C2 communications, payload delivery, and persistence mechanisms.

TeleStealer

PREMIUM

Malware Analysis

medium

Analyze packed malware behavior, detect persistence mechanisms, and investigate data exfiltration through dynamic analysis, traffic interception, and reverse engineering techniques.

T1197

PREMIUM

Threat Hunting

medium

Analyze Windows event logs in Splunk to identify T1197 BITS abuse, LOLBAS usage, attacker IP, and persistence mechanisms.

APT35

PREMIUM

Malware Analysis

medium

Perform forensic analysis on Android devices to identify, analyze, and mitigate threats from malicious applications and cyber espionage groups like Magic Hound.

KrakenKeylogger

Endpoint Forensics

medium

Analyze Windows 10 notification artifacts, installed applications, LNK files, and Applications logs to uncover malicious activity and enhance forensic investigation capabilities.

T1547

PREMIUM

Malware Analysis

medium

Investigate fileless malware by analyzing registry artifacts, decrypting in-memory payloads, and identifying malware families using forensic tools and reverse engineering techniques.

S3CredentialsHunt

PREMIUM

Cloud Forensics

medium

Analyze AWS CloudTrail logs with `jq` to reconstruct attacker TTPs, identify privilege escalation, and detect persistence mechanisms within a compromised cloud environment.

FalconEye

PREMIUM

Threat Hunting

medium

Learn to use Splunk for detecting, analyzing, and investigating cybersecurity threats through log analysis, threat hunting, privilege escalation, lateral movement, and advanced attack techniques.

AzurePot

Endpoint Forensics

medium

Understand real-world Linux compromise via CVE-2021-41773 by analyzing disk, memory, and system artifacts to identify attacker techniques, persistence methods, and IOCs.

Sysinternals

Endpoint Forensics

medium

Conduct endpoint forensic analysis to detect, analyze, and understand malware infections using disk images, registry artifacts, and threat intelligence.