Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.

EscapeRoom
Network Forensics
mediumReconstruct a multi-stage attack by analyzing network traffic, cracking credentials, and reverse engineering malware using Wireshark, John the Ripper, and IDA Pro to identify persistence and C2 commands.

Boss Of The SOC v1
Threat Hunting
mediumReconstruct multi-stage attack scenarios by analyzing Splunk logs and integrating OSINT from VirusTotal, ThreatCrowd, and WHOXY to identify TTPs and IOCs.

Maromafix Falldown - RansomHub
Threat Hunting, Endpoint Forensics
hardReconstruct a multi-stage ransomware attack by correlating Windows event logs, disk artifacts, and malware analysis using Elastic, MFTECmd, RegRipper, and DNSpy.

MarkShell - TA577
Threat Hunting
hardInvestigate a multi-stage phishing intrusion from initial access through domain compromise, persistence, and C2 deployment.

Code Blue - APT29
Cloud Forensics
hardReconstruct a multi-stage APT29 intrusion by analyzing Azure and M365 logs to trace device code phishing, OAuth token abuse, service account chaining, Silver SAML forgery, and PHI exfiltration.

Recruiter - Hanoi Op
Endpoint Forensics
hardWhen a "candidate" submits a resume thatβs more than it seems, itβs up to you to hunt through the artifacts, reconstruct the infection chain, and stop a data breach in its tracks.

RoastToRoot
Network Forensics
hardAnalyze network traffic to reconstruct a complete domain compromise attack chain, from AS-REP Roasting and Kerberoasting through privilege escalation, lateral movement, and data exfiltration using rclone.

Latrodectus β LunarSpider
Threat Hunting
hardCorrelate Splunk Sysmon logs and disk forensic artifacts across multiple hosts to reconstruct a multi-stage Latrodectus malware intrusion from initial access to data exfiltration.

RansomHub
Threat Hunting
hardReconstruct RansomHub ransomware attack chain by correlating Splunk logs and disk artifacts to identify password spray, lateral movement, data exfiltration, and ransomware deployment tactics.

BlackSuit APT Breach
Threat Hunting