Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.

LockBit
Endpoint Forensics
mediumReconstruct a multi-system LockBit ransomware attack chain by correlating Windows event logs, registry artifacts, and PowerShell activity to identify TTPs.

Kerberoasted
Threat Hunting
mediumDetect, analyze, and respond to Kerberoasting attacks by investigating Kerberos logs, identifying compromised accounts, and uncovering attacker persistence methods.

FalconEye
Threat Hunting
mediumLearn to use Splunk for detecting, analyzing, and investigating cybersecurity threats through log analysis, threat hunting, privilege escalation, lateral movement, and advanced attack techniques.

Eli
Endpoint Forensics
mediumLearn to perform Chromebook forensic analysis using tools like DB Browser and Notepad++, focusing on user artifacts, browser data, downloads, and Google Takeout for digital investigations.

MrRobot
Endpoint Forensics
mediumReconstruct a multi-stage attack chain using Volatility Framework to analyze memory dumps, identifying malware, persistence, credential theft, lateral movement, and C2 communications across compromised systems.

ElasticCase
Threat Hunting
mediumInvestigate a simulated multi-stage attack to identify compromise and attacker activity using Elastic SIEM.

HawkEye
Network Forensics
mediumReconstruct a HawkEye Keylogger data exfiltration incident by analyzing network traffic with Wireshark and CyberChef, identifying IoCs and stolen credentials.

Exfiltrated
Endpoint Forensics
mediumReconstruct a Linux intrusion by analyzing forensic images, system logs, and custom scripts to identify brute-force, privilege escalation, persistence, and exfiltrated data.

Hacked
Endpoint Forensics
mediumReconstruct initial access, system modifications, and persistence on a compromised Linux server by analyzing disk images and cracking passwords.

LGDroid
Endpoint Forensics
mediumAnalyze Android disk images using SQLite, Python, and log analysis to reconstruct user activity and extract key forensic artifacts.