Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.
XXE Infiltration
Network Forensics
easyAnalyze PCAP data using Wireshark to identify XXE vulnerabilities, extract compromised credentials, and detect web shell uploads for persistence.
RetailBreach
Network Forensics
easyInvestigate network traffic with Wireshark to identify attacker TTPs, extract XSS payloads and session tokens, and determine exploited web application vulnerabilities.
Tomcat Takeover
Network Forensics
easyAnalyze network traffic using Wireshark's custom columns, filters, and statistics to identify suspicious web server administration access and potential compromise.
T1598.002 - Dragonfly
Endpoint Forensics
easyAnalyze a spearphishing email to identify social engineering techniques and extract indicators of compromise from its headers and malicious attachment.
T1595
Network Forensics
easyAnalyze the PCAP file to identify malicious activity, using tools like Wireshark to detect threats, IP origins, and attacker techniques.
Perfect Survey
Threat Hunting
VaultBreak
Endpoint Forensics
mediumReconstruct a multi-stage attack by analyzing Sysmon, WMI, and Prefetch logs to identify initial infection, advanced persistence, and C2 communications.
FalconEye
Threat Hunting
mediumLearn to use Splunk for detecting, analyzing, and investigating cybersecurity threats through log analysis, threat hunting, privilege escalation, lateral movement, and advanced attack techniques.
Trident
Network Forensics
mediumSynthesize network, document, and malware forensics findings to reconstruct a multi-stage phishing attack, identifying exploit chains and C2 communication.
TomCracked
Network Forensics
hardAnalyze a web server compromise by analyzing network traffic to trace a Java deserialization exploit and the subsequent deployment of a Cobalt Strike beacon.
SolarDisruption
Network Forensics
hardInvestigate PLC network traffic and system logs to identify insider manipulation attempts and determine the cause of the solar panel disruption at AetherCore Technologies.
PaloAltoRCE - UTA0218
Threat Hunting
hardReconstruct a Palo Alto RCE attack timeline by analyzing firewall logs in ELK, identifying initial access, reverse shell, persistence, and data exfiltration artifacts.
Brutal Tank
Threat Hunting
hardReconstruct an ICS attack chain by analyzing network traffic with Arkime and Wireshark to identify PLC compromise, I/O manipulation, and classify techniques using MITRE ATT&CK for ICS.
ProxyShell
Network Forensics
hardAnalyze network traffic to identify exploitation attempts targeting the ProxyShell vulnerability and extract relevant indicators of compromise.
ProxyLogon - HAFNIUM
Threat Hunting
hardInvestigate SIEM logs using GrayLog to identify indicators of compromise associated with the ProxyLogon vulnerability (CVE-2021-26855).
Boss Of The SOC v3
Threat Hunting
hardApply Splunk search queries to extract information and answer questions from provided log data.
Boss Of The SOC v2
Threat Hunting
hardApply Attack-Based Hunting methodology using Splunk to analyze and correlate diverse network and host logs, identifying multiple distinct cyberattack scenarios.
















