Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

HawkEye

Network Forensics

medium

Reconstruct a HawkEye Keylogger data exfiltration incident by analyzing network traffic with Wireshark and CyberChef, identifying IoCs and stolen credentials.

l337 S4uc3

Endpoint Forensics

medium

Analyze network traffic and memory dumps using Wireshark, Zui, and Volatility to investigate a targeted attack, identify Zeus malware, and reconstruct attacker actions.

Brave

Endpoint Forensics

medium

Investigate Windows memory images using Volatility3, PowerShell, and a hex editor to extract system artifacts, analyze processes, network connections, and reconstruct user activity.

HireMe

Endpoint Forensics

medium

Analyze a disk image to investigate multiple forensic cases by examining registry, event logs, and email artifacts using specified forensic tools.

Injector

Endpoint Forensics

medium

Determine the web server compromise method and attacker actions by analyzing disk images, memory dumps, and registry artifacts using Autopsy, Volatility, and Registry Explorer.

XLM Macros

Malware Analysis

medium

Analyze Excel 4.0 macros using XLMDeobfuscator and OLEDUMP to identify anti-analysis techniques and subsequent stage download attempts.

Qradar101

Threat Hunting

medium

Analyze diverse log sources in QRadar SIEM to identify compromised systems, detect malicious tools, and reconstruct the sequence of attack events.

Acoustic

Network Forensics

medium

Analyze SIP and RTP protocols using Wireshark and BrimSecurity to identify malicious VoIP communication patterns and artifacts.

Hammered

Endpoint Forensics

medium

Analyze various Linux system logs using grep, awk, and sed to identify attacker TTPs, persistence, and reconstruct the attack timeline.

GitTheGate

PREMIUM

Threat Hunting

medium

Investigate network attack artifacts by analyzing logs in Kibana to identify compromised systems and incident timelines.