Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
ElasticCase
Threat Hunting
mediumInvestigate a simulated multi-stage attack to identify compromise and attacker activity using Elastic SIEM.
HawkEye
Network Forensics
mediumReconstruct a HawkEye Keylogger data exfiltration incident by analyzing network traffic with Wireshark and CyberChef, identifying IoCs and stolen credentials.
Exfiltrated
Endpoint Forensics
mediumReconstruct a Linux intrusion by analyzing forensic images, system logs, and custom scripts to identify brute-force, privilege escalation, persistence, and exfiltrated data.
Hacked
Endpoint Forensics
mediumReconstruct initial access, system modifications, and persistence on a compromised Linux server by analyzing disk images and cracking passwords.
LGDroid
Endpoint Forensics
mediumAnalyze Android disk images using SQLite, Python, and log analysis to reconstruct user activity and extract key forensic artifacts.
HireMe
Endpoint Forensics
mediumAnalyze a disk image to investigate multiple forensic cases by examining registry, event logs, and email artifacts using specified forensic tools.
Hammered
Endpoint Forensics
mediumAnalyze various Linux system logs using grep, awk, and sed to identify attacker TTPs, persistence, and reconstruct the attack timeline.
GitTheGate
Threat Hunting
mediumInvestigate network attack artifacts by analyzing logs in Kibana to identify compromised systems and incident timelines.
CorporateSecrets
Endpoint Forensics
mediumEvaluate a Windows disk image by correlating registry, event log, browser, and MFT artifacts to reconstruct evidence of corporate secret exfiltration.
Spotlight
Endpoint Forensics
mediumInvestigate macOS disk images using Autopsy, mac_apt, and SQLite to identify and extract hidden data potentially concealed with steganography.









