Blue Team Labs

Put your knowledge into practice with gamified cyber security challenges.

Exfiltrated

PREMIUM

Endpoint Forensics

medium

Reconstruct a Linux intrusion by analyzing forensic images, system logs, and custom scripts to identify brute-force, privilege escalation, persistence, and exfiltrated data.

Hacked

Endpoint Forensics

medium

Reconstruct initial access, system modifications, and persistence on a compromised Linux server by analyzing disk images and cracking passwords.

Injector

Endpoint Forensics

medium

Determine the web server compromise method and attacker actions by analyzing disk images, memory dumps, and registry artifacts using Autopsy, Volatility, and Registry Explorer.

Qradar101

Threat Hunting

medium

Analyze diverse log sources in QRadar SIEM to identify compromised systems, detect malicious tools, and reconstruct the sequence of attack events.

HoneyBOT

Network Forensics

medium

Reconstruct a network intrusion by analyzing PCAP traffic with Wireshark, identifying a CVE-2003-0533 exploit, extracting malware, and performing shellcode analysis with scdbg to uncover attacker techniques and IOCs.

Ulysses

Endpoint Forensics

medium

Analyze Linux system artifacts, including memory dumps and logs, with Volatility and FTK Imager to reconstruct an attack and identify IOCs.

GitTheGate

PREMIUM

Threat Hunting

medium

Investigate network attack artifacts by analyzing logs in Kibana to identify compromised systems and incident timelines.

Szechuan Sauce

Endpoint Forensics

medium

Reconstruct a data exfiltration incident by correlating memory, disk, network, and log artifacts using a suite of forensic tools.

Hunter

Endpoint Forensics

medium

Evaluate forensic artifacts from a disk image to confirm unauthorized port scanning and assess user intent for installing illegal applications.

EscapeRoom

Network Forensics

medium

Reconstruct a multi-stage attack by analyzing network traffic, cracking credentials, and reverse engineering malware using Wireshark, John the Ripper, and IDA Pro to identify persistence and C2 commands.