Among the many benefits of utilizing these labs is the opportunity to apply theoretical knowledge in practical scenarios, thus solidifying comprehension and skill mastery. Moreover, blue team-style labs provide a controlled environment in which to practice and experiment, without the fear of causing harm to real-world systems.
Some of the specific blue team-style labs that I have personally used include network intrusion detection and analysis, malware analysis and reverse engineering, incident response, and vulnerability scanning and management. These labs have challenged me to think critically, analyze complex scenarios, and develop creative solutions to multifaceted problems.
Phishing
Phishing Analysis Fundamentals
Traffic Analysis
BTLO Network Analysis – Ransomware
BTLO Network Analysis – Web Shell
Digital Forensics
CSIT’s CNY 2023 Mini Challenge
Memory Forensics
BTLO Memory Analysis – Ransomware
Malware Analysis
Practical Malware Analysis: Lab 1-1
Practical Malware Analysis: Lab 1-2
Practical Malware Analysis: Lab 1-3
Practical Malware Analysis: Lab 1-4
Practical Malware Analysis: Lab 3-1
Practical Malware Analysis: Lab 3-2
Practical Malware Analysis: Lab 3-3
BTLO Malicious PowerShell Analysis
Dynamic Malware Analysis Example #1
Dynamic Malware Analysis Example #2
BTLO Malware Analysis – Ransomware Script
BTLO PowerShell Analysis – Keylogger