Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

RCEMiner

PREMIUM

Network Forensics

medium

Correlate network traffic, RCE exploits, and C2 communications using Wireshark to reconstruct a multi-stage web server compromise, cryptomining, and lateral movement.

IcedID 2 - GOLD CABIN

PREMIUM

Endpoint Forensics

medium

Analyze memory artifacts and trace a ransomware attack's origin, execution, and persistence using forensic tools like Volatility 3 and MemProcFS.

LockBit

PREMIUM

Endpoint Forensics

medium

Reconstruct a multi-system LockBit ransomware attack chain by correlating Windows event logs, registry artifacts, and PowerShell activity to identify TTPs.

FalconEye

PREMIUM

Threat Hunting

medium

Learn to use Splunk for detecting, analyzing, and investigating cybersecurity threats through log analysis, threat hunting, privilege escalation, lateral movement, and advanced attack techniques.

MrRobot

Endpoint Forensics

medium

Reconstruct a multi-stage attack chain using Volatility Framework to analyze memory dumps, identifying malware, persistence, credential theft, lateral movement, and C2 communications across compromised systems.

ElasticCase

PREMIUM

Threat Hunting

medium

Investigate a simulated multi-stage attack to identify compromise and attacker activity using Elastic SIEM.

Qradar101

Threat Hunting

medium

Analyze diverse log sources in QRadar SIEM to identify compromised systems, detect malicious tools, and reconstruct the sequence of attack events.

GitTheGate

PREMIUM

Threat Hunting

medium

Investigate network attack artifacts by analyzing logs in Kibana to identify compromised systems and incident timelines.

WireDive

Network Forensics

medium

Analyze diverse network traffic using Wireshark to decrypt HTTPS, identify protocol misconfigurations, and extract critical network and system forensic artifacts.

Hunter

Endpoint Forensics

medium

Evaluate forensic artifacts from a disk image to confirm unauthorized port scanning and assess user intent for installing illegal applications.