CyberDefenders
CyberDefenders Labs
This section contains writeups and solutions for challenges from CyberDefenders, a gamified platform for blue team training and incident response practice.
Challenge Categories
The writeups are organized by the following categories:
- Cloud Forensics - Investigating security incidents in cloud environments
- Endpoint Forensics - Analyzing compromised systems and extracting evidence
- Malware Analysis - Reverse engineering and understanding malicious software
- Network Forensics - Examining network traffic and identifying threats
- Threat Hunting - Proactively searching for indicators of compromise
Each writeup includes detailed analysis, tools used, and step-by-step solutions to help you develop practical cybersecurity investigation skills.
All Content
Cloud Forensics
Cloud security investigations and forensics for AWS, Azure, and GCP environments
Endpoint Forensics
Windows and Linux endpoint forensics investigations and artifact analysis
Malware Analysis
Static and dynamic malware analysis, reverse engineering, and threat intelligence extraction
Network Forensics
Network traffic analysis, packet inspection, and investigating network-based attacks
Threat Hunting
Proactive threat hunting techniques and hunting for indicators of compromise in enterprise environments