Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.

CorporateSecrets
Endpoint Forensics
mediumEvaluate a Windows disk image by correlating registry, event log, browser, and MFT artifacts to reconstruct evidence of corporate secret exfiltration.

Spotlight
Endpoint Forensics
mediumInvestigate macOS disk images using Autopsy, mac_apt, and SQLite to identify and extract hidden data potentially concealed with steganography.

Hunter
Endpoint Forensics
mediumEvaluate forensic artifacts from a disk image to confirm unauthorized port scanning and assess user intent for installing illegal applications.

Szechuan Sauce
Endpoint Forensics
mediumReconstruct a data exfiltration incident by correlating memory, disk, network, and log artifacts using a suite of forensic tools.

EscapeRoom
Network Forensics
mediumReconstruct a multi-stage attack by analyzing network traffic, cracking credentials, and reverse engineering malware using Wireshark, John the Ripper, and IDA Pro to identify persistence and C2 commands.

Malware Traffic Analysis 6
Network Forensics
mediumInvestigate email, document, and network traffic using VirusTotal, oledump, and Wireshark to identify ransomware delivery mechanisms and C2 communications.

Malware Traffic Analysis 5
Network Forensics
mediumInvestigate network traffic using Wireshark, NetworkMiner, and Suricata to identify the specific malicious email responsible for system compromise.

Malware Traffic Analysis 4
Network Forensics
mediumReconstruct a malware infection timeline by analyzing network traffic, identifying exploit kit activity, and extracting indicators of compromise using Wireshark and NetworkMiner.

Malware Traffic Analysis 3
Network Forensics
mediumSynthesize network, binary, and threat intelligence artifacts to reconstruct an exploit kit attack chain, identifying components, deobfuscating payloads, and analyzing binary protections.

Malware Traffic Analysis 2
Network Forensics
mediumReconstruct an exploit kit attack chain from network traffic, identifying the infected host, extracting malware, and determining the exploited CVE using Wireshark and forensic tools.