Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

BumbleBee - GOLD CABIN

PREMIUM

Threat Hunting

medium

Correlate Windows event logs and Sysmon data across enterprise systems using ELK to reconstruct a multi-stage cyber attack from initial access to ransomware.

XMRig

PREMIUM

Endpoint Forensics

medium

Reconstruct attacker methods on a Linux system by analyzing a disk image, recovering deleted files with Photorec, and correlating logs, command history, and configuration files.

AndroidBreach

PREMIUM

Endpoint Forensics

medium

Analyze an Android device dump and reverse engineer a malicious APK using ALEAPP and JADX-GUI to identify malware functionality, data exfiltration, and extract compromised credentials.

IMDSv1

PREMIUM

Cloud Forensics

medium

Analyze network traffic and AWS CloudTrail logs using Wireshark and JQ to reconstruct an IMDSv1 SSRF exploitation and subsequent data exfiltration attack.

MalaCrypt

PREMIUM

Malware Analysis

medium

Develop skills in basic and advanced malware analysis, including static, dynamic, and code analysis, to identify, understand, and investigate malicious binaries.

Yara Wizards

PREMIUM

Detection Engineering

medium

Analyze malware behavior and develop YARA rules for proactive detection by identifying packing methods, entropy levels, and execution patterns.

AgentTesla

PREMIUM

Malware Analysis

medium

Learn to analyze and dissect Agent Tesla malware by unpacking, identifying embedded scripts, tracing data exfiltration, detecting persistence mechanisms, and understanding anti-VM evasion techniques.

ATMii

PREMIUM

Malware Analysis

medium

Understand and analyze ATM-targeting malware using static analysis tools, identify malicious behaviors, and trace how malware exploits legitimate APIs like XFS to manipulate ATM hardware and perform unauthorized actions.

TheTruth

PREMIUM

Endpoint Forensics

medium

Reconstruct an Android attack timeline using forensic artifacts to identify RatMilad malware, extract its C2, and attribute a fraudulent transaction.

GoogleCloudHunt

PREMIUM

Cloud Forensics

medium

Learn cloud forensics by analyzing Google Cloud logs with JQ to identify compromised accounts, data exfiltration, and attacker persistence methods in a simulated breach scenario.