Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

Trigona Ransomware - Water Ungaw

PREMIUM

Endpoint Forensics

medium

Learn to investigate ransomware attacks by analyzing logs, registry entries, and artifacts to trace attacker actions, tools used, and identify indicators of compromise.

ATMii

PREMIUM

Malware Analysis

medium

Understand and analyze ATM-targeting malware using static analysis tools, identify malicious behaviors, and trace how malware exploits legitimate APIs like XFS to manipulate ATM hardware and perform unauthorized actions.

BlueSky Ransomware

Network Forensics

medium

Reconstruct a BlueSky ransomware attack by analyzing network traffic, decoding PowerShell scripts, and examining persistence mechanisms to identify attacker tactics and IOCs.

ConfluenceRCE

PREMIUM

Endpoint Forensics

medium

Investigate a real-world cyberattack, identify compromise indicators, trace attacker activities, and apply forensic and threat intelligence techniques.

LockBit

PREMIUM

Endpoint Forensics

medium

Reconstruct a multi-system LockBit ransomware attack chain by correlating Windows event logs, registry artifacts, and PowerShell activity to identify TTPs.

Sysinternals

Endpoint Forensics

medium

Conduct endpoint forensic analysis to detect, analyze, and understand malware infections using disk images, registry artifacts, and threat intelligence.

DetectLog4j

PREMIUM

Endpoint Forensics

medium

Synthesize forensic artifacts across registry, logs, and binaries to reconstruct a Log4Shell exploitation attack chain, identifying C2, persistence, and ransomware behavior.

XLM Macros

Malware Analysis

medium

Analyze Excel 4.0 macros using XLMDeobfuscator and OLEDUMP to identify anti-analysis techniques and subsequent stage download attempts.

Ulysses

Endpoint Forensics

medium

Analyze Linux system artifacts, including memory dumps and logs, with Volatility and FTK Imager to reconstruct an attack and identify IOCs.

GitTheGate

PREMIUM

Threat Hunting

medium

Investigate network attack artifacts by analyzing logs in Kibana to identify compromised systems and incident timelines.