Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

AzureSpray

PREMIUM

Cloud Forensics

medium

Master the detection, investigation, and remediation of password spray attacks in Azure AD by analyzing sign-in logs with KQL queries, identifying attack patterns and compromised accounts, implementing Microsoft Sentinel analytics rules for automated detection, and applying security controls including Smart Lockout, Conditional Access policies, and incident response playbooks to protect against credential-based attacks.

Job Trap - OilRig

PREMIUM

Endpoint Forensics

medium

Analyze PowerShell and Sysmon logs to investigate macro-based malware, identify persistence via scheduled tasks, and extract C2 indicators and keylogger behavior using FTK Imager and olevba.

ResourcePacks

PREMIUM

Endpoint Forensics

medium

Reconstruct an attack timeline by analyzing forensic artifacts to identify a UAC bypass, WMI persistence, and backdoor user creation techniques.

WorkFromHome

PREMIUM

Endpoint Forensics

medium

Analyze forensic artifacts to trace an attacker's progression from initial social engineering and remote access to a "Sticky Keys" privilege escalation.

NetX-Support - TA569

PREMIUM

Endpoint Forensics

medium

Analyze browser, filesystem, and event artifacts to reconstruct the attack chain, identify the malicious download source, extract second-stage and C2 indicators, and determine persistence, account creation, and lateral movement.

Fog Ransomware - Fluttering Scorpius

PREMIUM

Endpoint Forensics

medium

Reconstruct the Fog ransomware attack chain by analyzing browser, registry, event logs, and MFT artifacts to identify initial access, persistence, BYOVD privilege escalation, and IOCs.

VaultBreak

PREMIUM

Endpoint Forensics

medium

Reconstruct a multi-stage attack by analyzing Sysmon, WMI, and Prefetch logs to identify initial infection, advanced persistence, and C2 communications.

Silent Breach

Endpoint Forensics

medium

Analyze a forensic image to extract communication artifacts, identify malware behavior, and decrypt encrypted files using FTK Imager, string analysis, and PowerShell scripting.

MBuchus

PREMIUM

Threat Intel

medium

Utilize OSINT, VirusTotal, and crt.sh to analyze a multi-stage malvertising campaign, identifying initial access, malware payloads, and attacker infrastructure.

Rhysida - Vice Society

PREMIUM

Threat Hunting

medium

Reconstruct the Rhysida ransomware attack chain, identifying initial access, persistence, C2, and impact using Splunk and CyberChef.