Blue Team Labs

Hello! I’m a SOC analyst and cybersecurity enthusiast. In my free time, I enjoy practicing on CTFs and writing up about them.


Through deliberate practice and ongoing learning, I have honed my skills in the critical field of cybersecurity. One way I have accomplished this is by actively seeking out blue team-style labs, which have proven to be immensely valuable in strengthening my proficiency in various defensive domains.

Among the many benefits of utilizing these labs is the opportunity to apply theoretical knowledge in practical scenarios, thus solidifying comprehension and skill mastery. Moreover, blue team-style labs provide a controlled environment in which to practice and experiment, without the fear of causing harm to real-world systems.

Some of the specific blue team-style labs that I have personally used include network intrusion detection and analysis, malware analysis and reverse engineering, incident response, and vulnerability scanning and management. These labs have challenged me to think critically, analyze complex scenarios, and develop creative solutions to multifaceted problems.


Phishing

Traffic Analysis

Digital Forensics

Memory Forensics

Malware Analysis

OSINT

Reverse Engineering

Others


Phishing

Phishing Analysis Fundamentals

LetsDefend Phishing Email

LetsDefend Email Analysis

BLTO Phishing Analysis

BLTO Phishing Analysis 2

Traffic Analysis

Traffic Analysis Essentials

LetsDefend Disclose The Agent

LetsDefend Http Basic Auth

BTLO Network Analysis – Ransomware

BTLO Network Analysis – Web Shell

Traffic analysis exercise 1

Traffic analysis exercise 2

Digital Forensics

CSIT’s CNY 2023 Mini Challenge

BTLO Meta

BTLO Shiba Insider

BTLO Deep Blue

BTLO The Planet’s Prestige

Conti

Insider

Memory Forensics

BTLO Memory Analysis – Ransomware

LetsDefend Memory Analysis

Malware Analysis

My notes

OSINT

L’espion

The Killer Clown

Prisoner of Wa

The Butcher

Nightmare Fuel

Intergalactic Warfare

Cold War Enemies

Dialogues from Atlantis

Reverse Engineering

Reverse Engineering

Others

Introduction to SIEM