Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
RCEMiner
Network Forensics
mediumCorrelate network traffic, RCE exploits, and C2 communications using Wireshark to reconstruct a multi-stage web server compromise, cryptomining, and lateral movement.
IcedID 2 - GOLD CABIN
Endpoint Forensics
mediumAnalyze memory artifacts and trace a ransomware attack's origin, execution, and persistence using forensic tools like Volatility 3 and MemProcFS.
LockBit
Endpoint Forensics
mediumReconstruct a multi-system LockBit ransomware attack chain by correlating Windows event logs, registry artifacts, and PowerShell activity to identify TTPs.
FalconEye
Threat Hunting
mediumLearn to use Splunk for detecting, analyzing, and investigating cybersecurity threats through log analysis, threat hunting, privilege escalation, lateral movement, and advanced attack techniques.
MrRobot
Endpoint Forensics
mediumReconstruct a multi-stage attack chain using Volatility Framework to analyze memory dumps, identifying malware, persistence, credential theft, lateral movement, and C2 communications across compromised systems.
ElasticCase
Threat Hunting
mediumInvestigate a simulated multi-stage attack to identify compromise and attacker activity using Elastic SIEM.
Qradar101
Threat Hunting
mediumAnalyze diverse log sources in QRadar SIEM to identify compromised systems, detect malicious tools, and reconstruct the sequence of attack events.
GitTheGate
Threat Hunting
mediumInvestigate network attack artifacts by analyzing logs in Kibana to identify compromised systems and incident timelines.
WireDive
Network Forensics
mediumAnalyze diverse network traffic using Wireshark to decrypt HTTPS, identify protocol misconfigurations, and extract critical network and system forensic artifacts.
Hunter
Endpoint Forensics
mediumEvaluate forensic artifacts from a disk image to confirm unauthorized port scanning and assess user intent for installing illegal applications.









