Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

BlueSky Ransomware

Network Forensics

medium

Reconstruct a BlueSky ransomware attack by analyzing network traffic, decoding PowerShell scripts, and examining persistence mechanisms to identify attacker tactics and IOCs.

LockBit

PREMIUM

Endpoint Forensics

medium

Reconstruct a multi-system LockBit ransomware attack chain by correlating Windows event logs, registry artifacts, and PowerShell activity to identify TTPs.

GoogleCloudHunt

PREMIUM

Cloud Forensics

medium

Learn cloud forensics by analyzing Google Cloud logs with JQ to identify compromised accounts, data exfiltration, and attacker persistence methods in a simulated breach scenario.

EcomBreach

PREMIUM

Endpoint Forensics

medium

Develop skills in forensic analysis, attack chain reconstruction, and threat detection following a web server compromise using Linux forensic techniques.

Amadey - APT-C-36

PREMIUM

Endpoint Forensics

medium

Reconstruct Amadey Trojan behavior by analyzing memory dumps with Volatility3 to identify malicious processes, C2 communications, payload delivery, and persistence mechanisms.

TeleStealer

PREMIUM

Malware Analysis

medium

Analyze packed malware behavior, detect persistence mechanisms, and investigate data exfiltration through dynamic analysis, traffic interception, and reverse engineering techniques.

T1197

PREMIUM

Threat Hunting

medium

Analyze Windows event logs in Splunk to identify T1197 BITS abuse, LOLBAS usage, attacker IP, and persistence mechanisms.

KrakenKeylogger

Endpoint Forensics

medium

Analyze Windows 10 notification artifacts, installed applications, LNK files, and Applications logs to uncover malicious activity and enhance forensic investigation capabilities.

T1547

PREMIUM

Malware Analysis

medium

Investigate fileless malware by analyzing registry artifacts, decrypting in-memory payloads, and identifying malware families using forensic tools and reverse engineering techniques.

S3CredentialsHunt

PREMIUM

Cloud Forensics

medium

Analyze AWS CloudTrail logs with `jq` to reconstruct attacker TTPs, identify privilege escalation, and detect persistence mechanisms within a compromised cloud environment.