Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

Yara Wizards

PREMIUM

Detection Engineering

medium

Analyze malware behavior and develop YARA rules for proactive detection by identifying packing methods, entropy levels, and execution patterns.

IcedID 2 - GOLD CABIN

PREMIUM

Endpoint Forensics

medium

Analyze memory artifacts and trace a ransomware attack's origin, execution, and persistence using forensic tools like Volatility 3 and MemProcFS.

BlueSky Ransomware

Network Forensics

medium

Reconstruct a BlueSky ransomware attack by analyzing network traffic, decoding PowerShell scripts, and examining persistence mechanisms to identify attacker tactics and IOCs.

Malicious PyPi

PREMIUM

Endpoint Forensics

medium

Perform forensic analysis on a compromised Windows system to identify malware, trace attacker activity, and understand persistence mechanisms.

ConfluenceRCE

PREMIUM

Endpoint Forensics

medium

Investigate a real-world cyberattack, identify compromise indicators, trace attacker activities, and apply forensic and threat intelligence techniques.

OpenWire

Network Forensics

medium

Investigate a Java deserialization vulnerability in Apache ActiveMQ that enables remote code execution through insecure class loading.

QBot

PREMIUM

Endpoint Forensics

medium

Reconstruct the QBot malware infection timeline by analyzing memory dumps, identifying malicious processes, files, and network communications using Volatility3 and VirusTotal.

TeleStealer

PREMIUM

Malware Analysis

medium

Analyze packed malware behavior, detect persistence mechanisms, and investigate data exfiltration through dynamic analysis, traffic interception, and reverse engineering techniques.

KrakenKeylogger

Endpoint Forensics

medium

Analyze Windows 10 notification artifacts, installed applications, LNK files, and Applications logs to uncover malicious activity and enhance forensic investigation capabilities.

APT35

PREMIUM

Malware Analysis

medium

Perform forensic analysis on Android devices to identify, analyze, and mitigate threats from malicious applications and cyber espionage groups like Magic Hound.