Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

GoogleCloudHunt

PREMIUM

Cloud Forensics

medium

Learn cloud forensics by analyzing Google Cloud logs with JQ to identify compromised accounts, data exfiltration, and attacker persistence methods in a simulated breach scenario.

Kerberoasted

PREMIUM

Threat Hunting

medium

Detect, analyze, and respond to Kerberoasting attacks by investigating Kerberos logs, identifying compromised accounts, and uncovering attacker persistence methods.

Eli

Endpoint Forensics

medium

Learn to perform Chromebook forensic analysis using tools like DB Browser and Notepad++, focusing on user artifacts, browser data, downloads, and Google Takeout for digital investigations.

MrRobot

Endpoint Forensics

medium

Reconstruct a multi-stage attack chain using Volatility Framework to analyze memory dumps, identifying malware, persistence, credential theft, lateral movement, and C2 communications across compromised systems.

ElasticCase

PREMIUM

Threat Hunting

medium

Investigate a simulated multi-stage attack to identify compromise and attacker activity using Elastic SIEM.

HawkEye

Network Forensics

medium

Reconstruct a HawkEye Keylogger data exfiltration incident by analyzing network traffic with Wireshark and CyberChef, identifying IoCs and stolen credentials.

l337 S4uc3

Endpoint Forensics

medium

Analyze network traffic and memory dumps using Wireshark, Zui, and Volatility to investigate a targeted attack, identify Zeus malware, and reconstruct attacker actions.

Brave

Endpoint Forensics

medium

Investigate Windows memory images using Volatility3, PowerShell, and a hex editor to extract system artifacts, analyze processes, network connections, and reconstruct user activity.

HireMe

Endpoint Forensics

medium

Analyze a disk image to investigate multiple forensic cases by examining registry, event logs, and email artifacts using specified forensic tools.

Injector

Endpoint Forensics

medium

Determine the web server compromise method and attacker actions by analyzing disk images, memory dumps, and registry artifacts using Autopsy, Volatility, and Registry Explorer.