Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

Szechuan Sauce

Endpoint Forensics

medium

Reconstruct a data exfiltration incident by correlating memory, disk, network, and log artifacts using a suite of forensic tools.

Hunter

Endpoint Forensics

medium

Evaluate forensic artifacts from a disk image to confirm unauthorized port scanning and assess user intent for installing illegal applications.

EscapeRoom

Network Forensics

medium

Reconstruct a multi-stage attack by analyzing network traffic, cracking credentials, and reverse engineering malware using Wireshark, John the Ripper, and IDA Pro to identify persistence and C2 commands.

Boss Of The SOC v1

PREMIUM

Threat Hunting

medium

Reconstruct multi-stage attack scenarios by analyzing Splunk logs and integrating OSINT from VirusTotal, ThreatCrowd, and WHOXY to identify TTPs and IOCs.

RoastToRoot

PREMIUM

Network Forensics

hard

Analyze network traffic to reconstruct a complete domain compromise attack chain, from AS-REP Roasting and Kerberoasting through privilege escalation, lateral movement, and data exfiltration using rclone.

LFI Escalation

PREMIUM

Endpoint Forensics

hard

Raining Dinosaurs - Storm-2603

PREMIUM

Threat Hunting

hard

Hunt through Splunk logs to uncover how attackers exploited a DMZ server, pivoted to the internal network, and deployed ransomware after exfiltrating sensitive data.

Latrodectus – LunarSpider

PREMIUM

Threat Hunting

hard

Correlate Splunk Sysmon logs and disk forensic artifacts across multiple hosts to reconstruct a multi-stage Latrodectus malware intrusion from initial access to data exfiltration.

RansomHub

PREMIUM

Threat Hunting

hard

Reconstruct RansomHub ransomware attack chain by correlating Splunk logs and disk artifacts to identify password spray, lateral movement, data exfiltration, and ransomware deployment tactics.

Spooler - APT28

PREMIUM

Endpoint Forensics

hard

Hunt browser downloads, MFT records, and Prefetch to unmask the initial dropper and rebuild the attack timeline.