Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.

T1110-003
Threat Hunting

T1598.002 - Dragonfly
Endpoint Forensics
easyAnalyze a spearphishing email to identify social engineering techniques and extract indicators of compromise from its headers and malicious attachment.

RedLine
Endpoint Forensics
easyEmploy Volatility to analyze a memory dump, identifying suspicious processes, network IOCs, memory protections, and attacker's command-and-control infrastructure.

PacketDetective
Network Forensics
easyAnalyze network traffic in PCAP files using Wireshark to extract IOCs and reconstruct attacker tactics like authentication and remote execution.

Poisoned PyTorch
Threat Hunting
mediumInvestigate a software supply-chain compromise that escalates into a ransomware attack, with emphasis on identifying pre-encryption operations.

ConsentStorm
Cloud Forensics
mediumAnalyze a cloud-native attack chain involving illicit consent grants, hardcoded credential discovery, Temporary Access Pass abuse, and ABAC bypass to understand modern Azure threat actor techniques.

KioskExpo7
Endpoint Forensics

Stolen Time - HiddenTear
Threat Hunting
mediumSynthesize and correlate diverse forensic artifacts from multiple systems to reconstruct the complete HiddenTear attack chain and attribute threat actor TTPs.

Perfect Survey
Threat Hunting

Nitrogen - Blackcat Ransomware
Threat Hunting
mediumReconstruct multi-stage ransomware attack by correlating Splunk telemetry, disk forensics, and registry artifacts to identify persistence mechanisms, credential dumping, and lateral movement.