Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
ProxyLogon - HAFNIUM
Threat Hunting
hardInvestigate SIEM logs using GrayLog to identify indicators of compromise associated with the ProxyLogon vulnerability (CVE-2021-26855).
Hafnium APT
Threat Hunting
hardCorrelate Windows Defender, Sysmon, and Security logs in Elastic Stack to reconstruct HafinumAPT's initial access, persistence, and lateral movement TTPs.
Patrick
Endpoint Forensics
hardInvestigate iOS device artifacts using iLEAPP and SQLite Browser to identify anomalous user behavior and potential illicit activity.
LTE Fallen Wall
Threat Hunting
hardReconstruct a Diameter signaling attack on an LTE core network using Kibana to identify 2FA bypass and unauthorized transactions.
Boss Of The SOC v3
Threat Hunting
hardApply Splunk search queries to extract information and answer questions from provided log data.
Boss Of The SOC v2
Threat Hunting
hardApply Attack-Based Hunting methodology using Splunk to analyze and correlate diverse network and host logs, identifying multiple distinct cyberattack scenarios.
Ignoble Scorpius APT
Threat Hunting
insaneApply Attack-Based Hunting principles to Splunk logs, correlating Windows and Sysmon data to identify and reconstruct a multi-stage ransomware attack.
TeamCity Exploit - APT29
Threat Hunting
insaneCorrelate Splunk logs and host forensic artifacts from triage images to reconstruct a multi-stage TeamCity compromise and identify attacker TTPs.
Flareon 2
Malware Analysis
insaneReverse engineer multi-stage malicious binaries using IDA Pro and debuggers to uncover hidden functionality and extract embedded flags.








