Skip to main content

Training Operations

Hands-On SOC Training Operations

SOCSimulator training operations are free, browser-based cybersecurity investigation exercises. Each operation places you inside a realistic SIEM, XDR, or Firewall console to practice alert triage, threat detection, and incident response against scenarios mapped to the MITRE ATT&CK framework.

17

Operations

157

Tasks

3

Tool Types

17 operations found

AWS IAM Key Abuse: From Leak to Takeover
PRO
Intermediate

AWS IAM Key Abuse: From Leak to Takeover

An investigation into a sophisticated cloud-native attack where exposed IAM credentials led to serverless exploitation, lateral movement via SSH key injection, and large-scale data exfiltration. You will analyze CloudTrail logs, VPC Flow logs, and GuardDuty alerts to trace the attacker's path from a leaked .env file to a full environment takeover.

SIEM
45m
25 pts
8 tasks
View Operation
LOTL Campaign: Blending Into Admin Activity
Intermediate

LOTL Campaign: Blending Into Admin Activity

In 2025, 79% of initial access is malware-free. This training scenario challenges analysts to identify sophisticated 'Living off the Land' (LotL) techniques where attackers use legitimate administrative tools like ntdsutil, netsh, and PowerShell to blend into normal network traffic. You will investigate a campaign targeting a manufacturing firm's Active Directory infrastructure, focusing on identity-based threats that have seen an 850% increase year-over-year.

SIEMXDR
45m
25 pts
8 tasks
View Operation
Kerberoasting: Service Ticket to Domain Admin
PRO
Intermediate

Kerberoasting: Service Ticket to Domain Admin

Analyze a high-speed identity-based attack where an adversary pivots from a VPN compromise to Active Directory dominance in under 4 hours. This scenario focuses on detecting Kerberoasting (T1558.003) via service ticket anomalies and tracking the rapid escalation to Domain Admin privileges.

SIEMXDR
45m
25 pts
8 tasks
View Operation
Cobalt Strike: Beacon Detection
Intermediate

Cobalt Strike: Beacon Detection

Analyze a sophisticated intrusion involving the exploitation of an Atlassian Confluence server, leading to Cobalt Strike beacon deployment and LockBit ransomware. This scenario focuses on identifying malleable C2 profiles, process injection into legitimate Windows processes, and the use of SOCKS proxies for lateral movement. You will navigate through SIEM logs and XDR process trees to reconstruct the attack timeline from initial access to final impact.

SIEMXDR
45m
25 pts
8 tasks
View Operation
Rogue RMM: Unauthorized Remote Access
Beginner

Rogue RMM: Unauthorized Remote Access

In 2025, Remote Monitoring and Management (RMM) abuse surged by 277%. Threat actors increasingly leverage legitimate tools like ScreenConnect and AnyDesk to bypass security controls and maintain persistent access. In this scenario, you will investigate a suspicious installation on an accounting department workstation. You'll need to distinguish between authorized administrative activity and a 'SilentConnect' infection that utilizes VBScript lures and PEB masquerading to hide its presence.

SIEMXDR
30m
20 pts
6 tasks
View Operation
MFA Fatigue: The Notification Flood
Beginner

MFA Fatigue: The Notification Flood

In this guided walkthrough, you will investigate a sophisticated identity-led intrusion. An attacker leveraged social engineering via Microsoft Teams and MFA push-bombing to 'log in' rather than 'break in'. You will analyze SIEM authentication patterns and XDR behavioral data to trace the attacker's path from a simple voice call to full environment compromise.

SIEMXDR
30m
20 pts
6 tasks
View Operation
Credential Harvesting: The Lookalike Login
Beginner

Credential Harvesting: The Lookalike Login

An investigation into a modern phishing campaign targeting critical infrastructure. You will analyze email headers for domain spoofing, identify 'Paste and Run' execution chains, and track the delivery of the LummaC2 information stealer through SIEM logs.

SIEM
30m
20 pts
6 tasks
View Operation
SocGholish: The Fake Browser Update
Beginner

SocGholish: The Fake Browser Update

Investigate a drive-by download attack where a compromised WordPress site delivered a highly obfuscated JavaScript loader using UTF-8 homoglyphs to evade detection. Trace the execution from the browser to system reconnaissance and the deployment of a Python-based backdoor used by RansomHub affiliates.

SIEMXDR
45m
20 pts
6 tasks
View Operation
Akira Ransomware: Full Kill Chain IR
PRO
Advanced

Akira Ransomware: Full Kill Chain IR

Step into the shoes of a Tier 3 SOC Analyst to investigate a high-impact ransomware intrusion by the Howling Scorpius group (Akira). This scenario covers the full lifecycle of a modern double-extortion attack, from initial VPN credential abuse and SEO poisoning to lateral movement, credential dumping, and final data exfiltration. You will need to correlate evidence across SIEM logs, XDR process trees, and Firewall traffic to reconstruct the timeline and identify the root cause of the breach.

SIEMXDRFirewall
1h 30m
50 pts
10 tasks
View Operation
ClickFix: The Fake CAPTCHA Trap
Beginner

ClickFix: The Fake CAPTCHA Trap

Investigate a modern 'ClickFix' social engineering attack where a user was tricked into executing a malicious PowerShell command via a fake CAPTCHA interface. You will analyze SIEM and XDR telemetry to trace the infection from the initial web lure to the deployment of an infostealer.

SIEMXDR
30m
20 pts
6 tasks
View Operation
Phishing Investigation: ZipLine Supply Chain Campaign
Beginner

Phishing Investigation: ZipLine Supply Chain Campaign

Investigate a sophisticated social engineering campaign targeting manufacturing supply chains. You will analyze a 'reversed' phishing flow where attackers use 'Contact Us' forms to trick employees into initiating email conversations, leading to the deployment of the custom MixShell in-memory implant via DNS tunneling.

SIEMXDRFirewall
45m
75 pts
8 tasks
View Operation
Malware Investigation: Emotet Epoch 4 Binary Padding Evasion
PRO
Intermediate

Malware Investigation: Emotet Epoch 4 Binary Padding Evasion

Investigate a resurgence of the Emotet botnet (Epoch 4) utilizing advanced defense evasion techniques. Trace the infection from a macro-enabled document to the deployment of inflated DLL payloads designed to bypass sandbox and scan engine limitations through binary padding. Analyze process hollowing of system utilities and the deployment of modular stealer components.

SIEMXDRFirewall
2h
150 pts
23 tasks
View Operation
Malware Investigation: NetSupport RAT Pokemon Phishing Campaign
PRO
Intermediate

Malware Investigation: NetSupport RAT Pokemon Phishing Campaign

Investigate a sophisticated phishing campaign where threat actors distributed the NetSupport Remote Administration Tool (RAT) by disguising it as a popular Pokemon card game. You will analyze the infection chain from the initial web download through persistence mechanisms and command-and-control configuration using SIEM, XDR, and Firewall logs.

SIEMXDRFirewall
45m
150 pts
5 tasks
View Operation
APT Investigation: Bluebottle Financial Sector Campaign
PRO
Advanced

APT Investigation: Bluebottle Financial Sector Campaign

A deep-dive investigation into a sophisticated multi-stage attack targeting financial institutions in Francophone Africa. Analysts will trace the infection from malicious ISO mounts through GuLoader execution, defense evasion via signed kernel drivers, and lateral movement using dual-use tools like Ngrok and PsExec. This scenario is based on real-world threat intelligence from the Symantec Threat Hunter Team regarding the Bluebottle/OPERA1ER group.

SIEMXDRFirewall
3h
305 pts
28 tasks
View Operation
Supply Chain Investigation: The poweRAT PyPI Campaign
Intermediate

Supply Chain Investigation: The poweRAT PyPI Campaign

Investigate a sophisticated supply chain attack targeting Python developers through malicious PyPI packages. You will analyze a multi-stage infection chain involving obfuscated PowerShell, Cloudflare Tunnels, and a Flask-based RAT used for data exfiltration and remote control.

SIEMXDRFirewall
1h
150 pts
5 tasks
View Operation
Malware Investigation: RedLine Stealer Infostealer Campaign
Intermediate

Malware Investigation: RedLine Stealer Infostealer Campaign

Investigate a RedLine Stealer infection originating from a malicious 'Netflix Checker' application. Analysts will trace the execution from the initial dropper to the final payload, identify the specific sensitive data targeted (browsers, crypto wallets, VPNs), and analyze the SOAP-based C2 communication used for exfiltration.

SIEMXDRFirewall
1h
150 pts
9 tasks
View Operation
Ransomware Investigation: ALPHV/BlackCat Healthcare Sector Campaign
Advanced

Ransomware Investigation: ALPHV/BlackCat Healthcare Sector Campaign

Investigate the sophisticated TTPs of the ALPHV (BlackCat) ransomware group following the breach of a major healthcare entity. You will analyze initial access via social engineering, command-line execution patterns, registry modifications for lateral movement, and the technical mechanics of their Rust-based encryption engine.

SIEMXDRFirewall
2h
280 pts
7 tasks
View Operation

Start Training — Free Forever

Create your free account and start investigating real-world attack scenarios. No credit card required. Track your progress, earn points, and build job-ready SOC analyst skills.

Get Started Free

We use cookies to improve your experience and measure usage. Learn more