Blue Team Labs



Among the many benefits of utilizing these labs is the opportunity to apply theoretical knowledge in practical scenarios, thus solidifying comprehension and skill mastery. Moreover, blue team-style labs provide a controlled environment in which to practice and experiment, without the fear of causing harm to real-world systems.

Some of the specific blue team-style labs that I have personally used include network intrusion detection and analysis, malware analysis and reverse engineering, incident response, and vulnerability scanning and management. These labs have challenged me to think critically, analyze complex scenarios, and develop creative solutions to multifaceted problems.


Phishing

Traffic Analysis

Digital Forensics

Memory Forensics

Malware Analysis

OSINT

Reverse Engineering

Others


Phishing

Phishing Analysis Fundamentals

LetsDefend Phishing Email

LetsDefend Email Analysis

BLTO Phishing Analysis

BLTO Phishing Analysis 2

Traffic Analysis

Traffic Analysis Essentials

LetsDefend Disclose The Agent

LetsDefend Http Basic Auth

BTLO Network Analysis – Ransomware

BTLO Network Analysis – Web Shell

Traffic analysis exercise 1

Traffic analysis exercise 2

Digital Forensics

CSIT’s CNY 2023 Mini Challenge

BTLO Meta

BTLO Shiba Insider

BTLO Deep Blue

BTLO The Planet’s Prestige

Conti

Insider

Memory Forensics

BTLO Memory Analysis – Ransomware

LetsDefend Memory Analysis

Malware Analysis

My notes

THM: Malware Introductory

Practical Malware Analysis: Lab 1-1

Practical Malware Analysis: Lab 1-2

Practical Malware Analysis: Lab 1-3

Practical Malware Analysis: Lab 1-4

Practical Malware Analysis: Lab 3-1

Practical Malware Analysis: Lab 3-2

Practical Malware Analysis: Lab 3-3

BTLO Malicious PowerShell Analysis

Dynamic Malware Analysis Example #1

Dynamic Malware Analysis Example #2

BTLO Malware Analysis – Ransomware Script

BTLO PowerShell Analysis – Keylogger

Malicious VBA

Malicious Doc

Malicious XLS

Presentation As a Malware

Investigate Web Attack

Port Scan Activity

Static String Analysis

OSINT

L’espion

The Killer Clown

Prisoner of Wa

The Butcher

Nightmare Fuel

Intergalactic Warfare

Cold War Enemies

Dialogues from Atlantis

Reverse Engineering

Reverse Engineering

Others

Introduction to SIEM

Phishing Email Playbook

Recent Posts

View all posts →

Create a website or blog at WordPress.com