Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.

Malware Traffic Analysis 1
Network Forensics
mediumAnalyze network traffic using Wireshark to identify an infected host, trace an exploit kit infection chain, and extract malicious URLs and file hashes.

Boss Of The SOC v1
Threat Hunting
mediumReconstruct multi-stage attack scenarios by analyzing Splunk logs and integrating OSINT from VirusTotal, ThreatCrowd, and WHOXY to identify TTPs and IOCs.

Recruiter - Hanoi Op
Endpoint Forensics
hardWhen a "candidate" submits a resume thatβs more than it seems, itβs up to you to hunt through the artifacts, reconstruct the infection chain, and stop a data breach in its tracks.

RoastToRoot
Network Forensics
hardAnalyze network traffic to reconstruct a complete domain compromise attack chain, from AS-REP Roasting and Kerberoasting through privilege escalation, lateral movement, and data exfiltration using rclone.

LFI Escalation
Endpoint Forensics

Raining Dinosaurs - Storm-2603
Threat Hunting
hardHunt through Splunk logs to uncover how attackers exploited a DMZ server, pivoted to the internal network, and deployed ransomware after exfiltrating sensitive data.

Latrodectus β LunarSpider
Threat Hunting
hardCorrelate Splunk Sysmon logs and disk forensic artifacts across multiple hosts to reconstruct a multi-stage Latrodectus malware intrusion from initial access to data exfiltration.

RansomHub
Threat Hunting
hardReconstruct RansomHub ransomware attack chain by correlating Splunk logs and disk artifacts to identify password spray, lateral movement, data exfiltration, and ransomware deployment tactics.

Spooler - APT28
Endpoint Forensics
hardHunt browser downloads, MFT records, and Prefetch to unmask the initial dropper and rebuild the attack timeline.

BlackSuit APT Breach
Threat Hunting