Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
IcedID 2 - GOLD CABIN
Endpoint Forensics
mediumAnalyze memory artifacts and trace a ransomware attack's origin, execution, and persistence using forensic tools like Volatility 3 and MemProcFS.
ATMii
Malware Analysis
mediumUnderstand and analyze ATM-targeting malware using static analysis tools, identify malicious behaviors, and trace how malware exploits legitimate APIs like XFS to manipulate ATM hardware and perform unauthorized actions.
BlueSky Ransomware
Network Forensics
mediumReconstruct a BlueSky ransomware attack by analyzing network traffic, decoding PowerShell scripts, and examining persistence mechanisms to identify attacker tactics and IOCs.
AsyncRAT
Malware Analysis
mediumThis lab aims to equip learners with practical skills in malware analysis by dissecting a multi-stage AsyncRAT infection. Participants will explore obfuscation techniques, payload extraction, persistence mechanisms, and steganographic methods used in real-world malware, enhancing their ability to detect, analyze, and respond to complex cyber threats.
Malicious PyPi
Endpoint Forensics
mediumPerform forensic analysis on a compromised Windows system to identify malware, trace attacker activity, and understand persistence mechanisms.
TheTruth
Endpoint Forensics
mediumReconstruct an Android attack timeline using forensic artifacts to identify RatMilad malware, extract its C2, and attribute a fraudulent transaction.
OpenWire
Network Forensics
mediumInvestigate a Java deserialization vulnerability in Apache ActiveMQ that enables remote code execution through insecure class loading.
QBot
Endpoint Forensics
mediumReconstruct the QBot malware infection timeline by analyzing memory dumps, identifying malicious processes, files, and network communications using Volatility3 and VirusTotal.
LockBit
Endpoint Forensics
mediumReconstruct a multi-system LockBit ransomware attack chain by correlating Windows event logs, registry artifacts, and PowerShell activity to identify TTPs.
MSI
Malware Analysis
mediumAnalyze a malicious MSI installer by deconstructing its components, extracting embedded scripts, identifying C2 communication, and attributing the malware family.









