Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

AzureHunt

PREMIUM

Cloud Forensics

easy

Correlate Azure AD, Activity, and Blob Storage logs in Elastic Stack to reconstruct an attack timeline, identifying initial access, lateral movement, persistence, and data exfiltration.

The Crime

Endpoint Forensics

easy

Utilize ALEAPP to analyze Android device artifacts, reconstructing a victim's financial details, movements, and communication patterns.

REvil - GOLD SOUTHFIELD

PREMIUM

Threat Hunting

easy

Analyze Sysmon logs in Elastic SIEM to investigate REvil ransomware attack behaviors, decode recovery sabotage commands, and identify IOCs including the C2 onion domain.

Amadey - APT-C-36

PREMIUM

Endpoint Forensics

easy

Reconstruct Amadey Trojan behavior by analyzing memory dumps with Volatility3 to identify malicious processes, C2 communications, payload delivery, and persistence mechanisms.

Yellow RAT

Threat Intel

easy

Analyze malware artifacts using threat intelligence platforms like VirusTotal to identify IOCs, C2 servers, and understand adversary tactics.

Tomcat Takeover

Network Forensics

easy

Analyze network traffic using Wireshark's custom columns, filters, and statistics to identify suspicious web server administration access and potential compromise.

AWSRaid

PREMIUM

Cloud Forensics

easy

Investigate AWS CloudTrail logs using Splunk to identify unauthorized access, analyze configuration changes, and detect persistence mechanisms.

T1110-003

PREMIUM

Threat Hunting

easy

T1598.002 - Dragonfly

PREMIUM

Endpoint Forensics

easy

Analyze a spearphishing email to identify social engineering techniques and extract indicators of compromise from its headers and malicious attachment.

T1595

PREMIUM

Network Forensics

easy

Analyze the PCAP file to identify malicious activity, using tools like Wireshark to detect threats, IP origins, and attacker techniques.