Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
Zoom Incident - Ignoble Scorpius APT
Threat Hunting
hardCorrelate Sysmon events and forensic artifacts across multiple hosts using Splunk to reconstruct a full ransomware kill chain, from initial compromise to domain-wide impact.
Voldemort - APT41
Threat Hunting
hardSynthesize disparate forensic artifacts across email, network, and host logs to reconstruct a multi-stage phishing, malware, and C2 attack, attributing it to a known campaign.
RepoReaper - Water Curse
Endpoint Forensics
hardInvestigate a disk image to uncover a UAC bypass and process hollowing and trace the attack back to a compromised software repository.
TomCracked
Network Forensics
hardAnalyze a web server compromise by analyzing network traffic to trace a Java deserialization exploit and the subsequent deployment of a Cobalt Strike beacon.
Rilide
Malware Analysis
hardReconstruct Rilide browser extension attack mechanisms by deobfuscating JavaScript, analyzing Chrome extension artifacts, and leveraging OSINT to identify persistence, C2, and exfiltration IOCs.
Midnight RDP
Threat Hunting
hardReconstruct a sophisticated intrusion's timeline by correlating Windows Event, Sysmon, and PowerShell logs in Splunk, identifying RDP-based initial access, persistence, privilege escalation, and C2.
SolarDisruption
Network Forensics
hardInvestigate PLC network traffic and system logs to identify insider manipulation attempts and determine the cause of the solar panel disruption at AetherCore Technologies.
PaloAltoRCE - UTA0218
Threat Hunting
hardReconstruct a Palo Alto RCE attack timeline by analyzing firewall logs in ELK, identifying initial access, reverse shell, persistence, and data exfiltration artifacts.
SpottedInTheWild
Endpoint Forensics
hardReconstruct an attack timeline by analyzing disk images, event logs, and malicious scripts to identify initial access, persistence, and data exfiltration techniques.
GhostDetect
Malware Analysis
hardInvestigate a multi-stage phishing attack by analyzing LNK files, de-obfuscating scripts, identifying C2, decrypting payloads, and attributing the TTPs to the UAC-0057 APT group.









