LetsDefend: Windows Memory DumpFor this challenge we've been tasked with determining which user downloaded a malicious crack tool, where the file was downloaded, and what actions were taken by the second-stage payload.2024-07-24
LetsDefend: Memory AnalysisFor this challenge we've been tasked with finding the malicious process running on a compromised endpoint and to determine which user is responsible. This write-up includes instructions for Volatility 2 and corresponding commands for Volatility 3.2024-07-22
LetsDefend: Linux Disk ForensicsThis is a hard-difficulty challenge that requires us to analyze the disk image of a compromised linux system. We'll analyze various Linux system files and log files to gather the required information.2024-07-19
BlueTeamLabs: DoctorInvestigate a compromised web server and determine what vulnerabilities were exploited by the attacker and what actions they performed.2024-07-17
BlueTeamLabs: Total RecallFor this challenge we are tasked with using Redline to conduct memory analysis of a compromised host.2024-07-17
NICE: Disguising Dastardly DeedsFor this challenge we are tasked with decrypting a ZIP that contains exfiltrated data.2024-07-14
LetsDefend: Malicious WordPress PluginThis is a medium-difficulty challenge that requires the analysis of a pcap to determine the source of a compromise and actions performed by the attacker.2024-07-12
NICE: Foolish Firewall ConfigurationsThis challenge requires configuring firewalls on multiple devices.2024-06-29
NICE: Linux Administration 201In this NICE challenge, we are tasked with configuring network interfaces, DNS, Active Directory services, and account provisioning.2024-06-09
NICE: Linux Administration 101: Users, Access & UpdatesFor this challenge we are tasked with creating user accounts, assigning privileges, updating apache, and configuring SSH.2024-06-02