Blue Team Labs
Put your knowledge into practice with gamified cyber security challenges.

T1584.004
Threat Intel
easyApply MISP to manage security events, create attributes, and integrate threat intelligence from data feeds.

T1583.002
Threat Intel
easyAnalyze a malware campaign using MISP to identify communication patterns and extract key indicators of compromise (IOCs), including malware family and file hashes.

BYOD Breach
Endpoint Forensics
mediumCorrelate Android and Windows forensic artifacts, including logs and malware analysis, to reconstruct a multi-stage BYOD breach from initial access to persistence.

MBuchus
Threat Intel
mediumUtilize OSINT, VirusTotal, and crt.sh to analyze a multi-stage malvertising campaign, identifying initial access, malware payloads, and attacker infrastructure.

Beta Gamer
Endpoint Forensics
mediumReconstruct an intrusion timeline by analyzing event logs, registry, file system, and network artifacts to identify attacker TTPs and data exfiltration.

TheTruth
Endpoint Forensics
mediumReconstruct an Android attack timeline using forensic artifacts to identify RatMilad malware, extract its C2, and attribute a fraudulent transaction.

TeamCity Exploit - APT29
Threat Hunting
insaneCorrelate Splunk logs and host forensic artifacts from triage images to reconstruct a multi-stage TeamCity compromise and identify attacker TTPs.