Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
TheTruth
Endpoint Forensics
mediumReconstruct an Android attack timeline using forensic artifacts to identify RatMilad malware, extract its C2, and attribute a fraudulent transaction.
TeleStealer
Malware Analysis
mediumAnalyze packed malware behavior, detect persistence mechanisms, and investigate data exfiltration through dynamic analysis, traffic interception, and reverse engineering techniques.
KrakenKeylogger
Endpoint Forensics
mediumAnalyze Windows 10 notification artifacts, installed applications, LNK files, and Applications logs to uncover malicious activity and enhance forensic investigation capabilities.
MrRobot
Endpoint Forensics
mediumReconstruct a multi-stage attack chain using Volatility Framework to analyze memory dumps, identifying malware, persistence, credential theft, lateral movement, and C2 communications across compromised systems.
HawkEye
Network Forensics
mediumReconstruct a HawkEye Keylogger data exfiltration incident by analyzing network traffic with Wireshark and CyberChef, identifying IoCs and stolen credentials.
WebLogic
Endpoint Forensics
mediumReconstruct a WebLogic server attack timeline by analyzing memory dumps with Volatility and MemProcFS to identify initial access, persistence, C2, and data exfiltration IOCs.
Exfiltrated
Endpoint Forensics
mediumReconstruct a Linux intrusion by analyzing forensic images, system logs, and custom scripts to identify brute-force, privilege escalation, persistence, and exfiltrated data.
Qradar101
Threat Hunting
mediumAnalyze diverse log sources in QRadar SIEM to identify compromised systems, detect malicious tools, and reconstruct the sequence of attack events.
Ulysses
Endpoint Forensics
mediumAnalyze Linux system artifacts, including memory dumps and logs, with Volatility and FTK Imager to reconstruct an attack and identify IOCs.
GitTheGate
Threat Hunting
mediumInvestigate network attack artifacts by analyzing logs in Kibana to identify compromised systems and incident timelines.









