Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
BumbleBee - GOLD CABIN
Threat Hunting
mediumCorrelate Windows event logs and Sysmon data across enterprise systems using ELK to reconstruct a multi-stage cyber attack from initial access to ransomware.
XMRig
Endpoint Forensics
mediumReconstruct attacker methods on a Linux system by analyzing a disk image, recovering deleted files with Photorec, and correlating logs, command history, and configuration files.
AndroidBreach
Endpoint Forensics
mediumAnalyze an Android device dump and reverse engineer a malicious APK using ALEAPP and JADX-GUI to identify malware functionality, data exfiltration, and extract compromised credentials.
IMDSv1
Cloud Forensics
mediumAnalyze network traffic and AWS CloudTrail logs using Wireshark and JQ to reconstruct an IMDSv1 SSRF exploitation and subsequent data exfiltration attack.
MalaCrypt
Malware Analysis
mediumDevelop skills in basic and advanced malware analysis, including static, dynamic, and code analysis, to identify, understand, and investigate malicious binaries.
Yara Wizards
Detection Engineering
mediumAnalyze malware behavior and develop YARA rules for proactive detection by identifying packing methods, entropy levels, and execution patterns.
AgentTesla
Malware Analysis
mediumLearn to analyze and dissect Agent Tesla malware by unpacking, identifying embedded scripts, tracing data exfiltration, detecting persistence mechanisms, and understanding anti-VM evasion techniques.
ATMii
Malware Analysis
mediumUnderstand and analyze ATM-targeting malware using static analysis tools, identify malicious behaviors, and trace how malware exploits legitimate APIs like XFS to manipulate ATM hardware and perform unauthorized actions.
TheTruth
Endpoint Forensics
mediumReconstruct an Android attack timeline using forensic artifacts to identify RatMilad malware, extract its C2, and attribute a fraudulent transaction.
GoogleCloudHunt
Cloud Forensics
mediumLearn cloud forensics by analyzing Google Cloud logs with JQ to identify compromised accounts, data exfiltration, and attacker persistence methods in a simulated breach scenario.









