Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
Stealthy Ascent
Endpoint Forensics
mediumReconstruct a Linux system's unauthorized access and ransomware incident by analyzing logs, browser, and email artifacts, decrypting payloads, and identifying persistence.
PhishStrike
Threat Intel
mediumAnalyze email headers and threat intelligence to identify phishing indicators, malware persistence, and C2 channels, extracting actionable IOCs.
Trigona Ransomware - Water Ungaw
Endpoint Forensics
mediumLearn to investigate ransomware attacks by analyzing logs, registry entries, and artifacts to trace attacker actions, tools used, and identify indicators of compromise.
ATMii
Malware Analysis
mediumUnderstand and analyze ATM-targeting malware using static analysis tools, identify malicious behaviors, and trace how malware exploits legitimate APIs like XFS to manipulate ATM hardware and perform unauthorized actions.
ConfluenceRCE
Endpoint Forensics
mediumInvestigate a real-world cyberattack, identify compromise indicators, trace attacker activities, and apply forensic and threat intelligence techniques.
OpenWire
Network Forensics
mediumInvestigate a Java deserialization vulnerability in Apache ActiveMQ that enables remote code execution through insecure class loading.
QBot
Endpoint Forensics
mediumReconstruct the QBot malware infection timeline by analyzing memory dumps, identifying malicious processes, files, and network communications using Volatility3 and VirusTotal.
GoogleCloudHunt
Cloud Forensics
mediumLearn cloud forensics by analyzing Google Cloud logs with JQ to identify compromised accounts, data exfiltration, and attacker persistence methods in a simulated breach scenario.
EcomBreach
Endpoint Forensics
mediumDevelop skills in forensic analysis, attack chain reconstruction, and threat detection following a web server compromise using Linux forensic techniques.
RARCVE
Malware Analysis
mediumAnalyze, decrypt, and trace a multi-stage malware infection, uncovering obfuscation techniques, payload delivery methods, and network communication indicators.









