Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
AbuSESer - Trufflenet
Cloud Forensics
easyInvestigate a complex Business Email Compromise attack by correlating AWS CloudTrail and Lambda logs in CloudWatch Logs Insights to reconstruct the attack timeline and attribute TTPs.
Rogue Azure
Cloud Forensics
easyReconstruct a multi-stage Azure attack timeline by analyzing Entra ID, Audit, and Storage Blob logs using Kusto Query Language to identify initial access, persistence, privilege escalation, and data exfiltration.
Lockdown
Network Forensics
easyReconstruct a multi-stage intrusion by analyzing network traffic, memory, and malware artifacts using Wireshark, Volatility, and VirusTotal, mapping findings to MITRE ATT&CK.
Openfire
Network Forensics
easyReconstruct an Openfire server attack timeline by analyzing PCAP files with Wireshark to identify login attempts, plugin uploads, command execution, and the exploited CVE-2023-32315 vulnerability.
Reveal
Endpoint Forensics
easyReconstruct a multi-stage attack by analyzing Windows memory dumps using Volatility 3, identifying malicious processes, command lines, and correlating findings with threat intelligence.
Red Stealer
Threat Intel
easyAnalyze a suspicious executable using VirusTotal and MalwareBazaar to extract IOCs, identify C2 infrastructure, MITRE ATT&CK techniques, and privilege escalation mechanisms.
XXE Infiltration
Network Forensics
easyAnalyze PCAP data using Wireshark to identify XXE vulnerabilities, extract compromised credentials, and detect web shell uploads for persistence.
3CX Supply Chain
Threat Intel
easyReconstruct the 3CX supply chain attack by analyzing compromised MSI and DLL artifacts to identify TTPs and attribute the incident to a threat actor.
RetailBreach
Network Forensics
easyInvestigate network traffic with Wireshark to identify attacker TTPs, extract XSS payloads and session tokens, and determine exploited web application vulnerabilities.
PsExec Hunt
Network Forensics
easyAnalyze SMB traffic in a PCAP file using Wireshark to identify PsExec lateral movement, compromised systems, user credentials, and administrative shares.
REvil - GOLD SOUTHFIELD
Threat Hunting
easyAnalyze Sysmon logs in Elastic SIEM to investigate REvil ransomware attack behaviors, decode recovery sabotage commands, and identify IOCs including the C2 onion domain.
Tomcat Takeover
Network Forensics
easyAnalyze network traffic using Wireshark's custom columns, filters, and statistics to identify suspicious web server administration access and potential compromise.
T1110-003
Threat Hunting
Poisoned PyTorch
Threat Hunting
mediumInvestigate a software supply-chain compromise that escalates into a ransomware attack, with emphasis on identifying pre-encryption operations.
ConsentStorm
Cloud Forensics
mediumAnalyze a cloud-native attack chain involving illicit consent grants, hardcoded credential discovery, Temporary Access Pass abuse, and ABAC bypass to understand modern Azure threat actor techniques.
KioskExpo7
Endpoint Forensics
Stolen Time - HiddenTear
Threat Hunting
mediumSynthesize and correlate diverse forensic artifacts from multiple systems to reconstruct the complete HiddenTear attack chain and attribute threat actor TTPs.
Nitrogen - Blackcat Ransomware
Threat Hunting
mediumReconstruct multi-stage ransomware attack by correlating Splunk telemetry, disk forensics, and registry artifacts to identify persistence mechanisms, credential dumping, and lateral movement.
Famous Chollima
Endpoint Forensics
mediumSynthesize forensic artifacts and Python source code from a disk image to reconstruct a credential theft attack, identifying persistence methods and C2 communications.
CredSnare - Angry Likho APT
Threat Hunting
mediumCorrelate Splunk logs and filesystem artifacts from a workstation and domain controller to reconstruct an attack chain involving Kerberos delegation and credential theft.



















