Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

PacketDetective

PREMIUM

Network Forensics

easy

Analyze network traffic in PCAP files using Wireshark to extract IOCs and reconstruct attacker tactics like authentication and remote execution.

GrabThePhisher

Threat Intel

easy

Analyze a cryptocurrency phishing kit to identify exfiltration methods, extract critical IOCs, and gather threat actor intelligence using local logs and Telegram APIs.

Lespion

Threat Intel

easy

Investigate an insider threat by analyzing GitHub repositories for exposed credentials, using OSINT tools to correlate online accounts, and performing image analysis to identify locations.

Insider

Endpoint Forensics

easy

Analyze Linux disk image artifacts, including logs and Bash history, using FTK Imager to investigate insider threat activities and reconstruct user actions.

Raining Dinosaurs - Storm-2603

PREMIUMNew

Threat Hunting

medium

Hunt through Splunk logs to uncover how attackers exploited a DMZ server, pivoted to the internal network, and deployed ransomware after exfiltrating sensitive data.

Perfect Survey

PREMIUM

Threat Hunting

medium

Nitrogen - Blackcat Ransomware

PREMIUM

Threat Hunting

medium

Reconstruct multi-stage ransomware attack by correlating Splunk telemetry, disk forensics, and registry artifacts to identify persistence mechanisms, credential dumping, and lateral movement.

StarkTech Incident - APT41

PREMIUM

Threat Hunting

medium

Reconstruct a multi-stage attack timeline by analyzing Sysmon and Windows event logs in Splunk to identify attacker tactics from initial access to data exfiltration.

Famous Chollima

PREMIUM

Endpoint Forensics

medium

Synthesize forensic artifacts and Python source code from a disk image to reconstruct a credential theft attack, identifying persistence methods and C2 communications.

BYOD Breach

PREMIUM

Endpoint Forensics

medium

Correlate Android and Windows forensic artifacts, including logs and malware analysis, to reconstruct a multi-stage BYOD breach from initial access to persistence.