Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.

IMDSv1
Cloud Forensics
mediumAnalyze network traffic and AWS CloudTrail logs using Wireshark and JQ to reconstruct an IMDSv1 SSRF exploitation and subsequent data exfiltration attack.

GoldenSpray
Threat Hunting
mediumReconstruct a multi-stage intrusion timeline by analyzing Windows and Sysmon event logs within Elastic SIEM to identify key attack tactics, techniques, and procedures.

RCEMiner
Network Forensics
mediumCorrelate network traffic, RCE exploits, and C2 communications using Wireshark to reconstruct a multi-stage web server compromise, cryptomining, and lateral movement.

IcedID 2 - GOLD CABIN
Endpoint Forensics
mediumAnalyze memory artifacts and trace a ransomware attack's origin, execution, and persistence using forensic tools like Volatility 3 and MemProcFS.

LockBit
Endpoint Forensics
mediumReconstruct a multi-system LockBit ransomware attack chain by correlating Windows event logs, registry artifacts, and PowerShell activity to identify TTPs.

FalconEye
Threat Hunting
mediumLearn to use Splunk for detecting, analyzing, and investigating cybersecurity threats through log analysis, threat hunting, privilege escalation, lateral movement, and advanced attack techniques.

MrRobot
Endpoint Forensics
mediumReconstruct a multi-stage attack chain using Volatility Framework to analyze memory dumps, identifying malware, persistence, credential theft, lateral movement, and C2 communications across compromised systems.

ElasticCase
Threat Hunting
mediumInvestigate a simulated multi-stage attack to identify compromise and attacker activity using Elastic SIEM.

Qradar101
Threat Hunting
mediumAnalyze diverse log sources in QRadar SIEM to identify compromised systems, detect malicious tools, and reconstruct the sequence of attack events.

GitTheGate
Threat Hunting
mediumInvestigate network attack artifacts by analyzing logs in Kibana to identify compromised systems and incident timelines.