HackTheBox Sherlocks - Comprehensive Index Complete index of all known HackTheBox Sherlock DFIR investigation labs with writeup links, difficulty ratings, categories, and key techniques.
Sherlocks are defensive security labs that simulate real-world security incidents. You investigate evidence, analyze artifacts, and answer forensic questions to solve the case.
Summary Difficulty Path Count Focus Easy Easy 25+ Log Analysis, Basic DFIR, Simple Malware Triage Medium Medium 30+ Memory Forensics, AD Attacks, Cloud IR, Complex Malware Hard Hard 15+ APT Investigation, Complex IR, Multi-Source Correlation Insane - 5+ Full-Scale Incident Response, Advanced Threat Actor Attribution
Easy Sherlocks # Sherlock Category Key Techniques Writeup 1 Meerkat SOC Suricata alerts, PCAP, credential stuffing, CVE-2022-25237 (Bonitasoft) 0xdf 2 Brutus DFIR SSH brute force, auth.log analysis, failed login detection 0xdf 3 BFT DFIR Master File Table (MFT) analysis, Zimmerman tools, ZoneID 0xdf 4 Unit42 Malware Analysis Sysmon logs, UltraVNC backdoor, Palo Alto Unit42 campaign 0xdf 5 Noted DFIR Notepad++ artifacts, AppData analysis, data extortion 0xdf 6 Bumblebee DFIR phpBB SQLite database, access logs, web shell analysis 0xdf 7 Knock Knock Network Forensics PCAP, password spray, FTP, port knocking, SSH, GonnaCry ransomware 0xdf 8 i-like-to DFIR MOVEit Transfer compromise, CVE investigation 0xdf 9 Recollection DFIR Memory forensics, Volatility, process analysis jon-brandy GitHub 10 Logjammer Log Analysis Windows Event Logs (Security, System, Defender, Firewall, PowerShell), scheduled tasks Medium - Chicken0248 11 Pikaptcha DFIR Registry Explorer, NetworkMiner, PowerShell run dialog abuse, fake CAPTCHA 0xdf 12 Campfire-1 Active Directory Kerberoasting detection, PowerView, Rubeus, Event ID 4769 0xdf 13 Campfire-2 Active Directory AS-REP Roasting, event log analysis, compromised accounts 0xdf 14 Safecracker DFIR Malicious file forensic analysis adeadfed 15 Litter SOC Network forensics, data exfiltration indicators Medium - jniket 16 Heartbreaker-Continuum Malware Analysis PEStudio, Ghidra code analysis, VirusTotal, MITRE ATT&CK mapping Medium - Mattv0 17 Lockpick Malware Analysis Ransomware analysis, encryption key recovery Thamizhiniyan GitBook 18 Lockpick 2.0 Malware Analysis Advanced ransomware, key recovery techniques Thamizhiniyan GitBook 19 SmartyPants DFIR Windows RDP event logs, Smart Screen debug logs jon-brandy GitHub 20 JingleBell DFIR Holiday-themed forensics investigation abubakar-shahid GitHub 21 JenkreadD DFIR Jenkins CVE-2024-23897 arbitrary file read HTB Blog 22 Packet Puzzle Network Forensics PCAP analysis, Japanese crypto firm cyberattack Medium - Deven
Medium Sherlocks # Sherlock Category Key Techniques Writeup 1 Crown Jewel-1 Active Directory NTDS.dit dump, Volume Shadow Copy Service, AD enumeration Medium - Drew 2 Crown Jewel-2 Active Directory Lateral movement detection, Pass-the-Hash SystemWeakness 3 Noxious Active Directory LLMNR poisoning, rogue device detection, AD network recon 0xdf 4 Reaper Active Directory NTLM relay attack, LLMNR response poisoning, Security Log 0xdf 5 Subatomic Malware Analysis Electron app malware, fake game installer, Discord hijacking 0xdf 6 Constellation DFIR Insider threat, URL forensics, Discord/Google timeline 0xdf 7 TickTock DFIR Spear-phishing investigation, email forensics Medium - jniket 8 Tracer Threat Hunting PsExec detection, SOC alert investigation, lateral movement Medium - Ahmad 9 Hyperfiletable DFIR MFT parsing, analyzeMFT, MFTExplorer, ZoneID, file sizes Medium - L0rd$ud0 10 Nubilum-1 Cloud Forensics AWS CloudTrail logs, compromised EC2, PoshC2 C2 server 0xdf 11 Nubilum-2 Cloud Forensics AWS cloud forensics, advanced cloud investigation Medium - Chicken0248 12 Jugglin DFIR Windows Subsystem for Linux (WSL) abuse, threat actor leveraging WSL Medium - Chicken0248 13 Ultimatum DFIR WordPress compromise, Threat Actor investigation SystemWeakness 14 Ore DFIR Grafana artifacts, XMRIG cryptominer, CatScale, UNIX log analysis jon-brandy GitHub 15 RogueOne Network Forensics C2 traffic detection, network-based threat hunting jon-brandy GitHub 16 Lockpick 3.0 Malware Analysis Advanced ransomware variant, increased threat actor skillset Roy 17 Lockpick 4.0 Malware Analysis Latest ransomware evolution, key recovery Roy 18 MisCloud Cloud Forensics GCP breach, Gitea vulnerability, cloud misconfiguration Medium - Praj 19 Heartbreaker-Denouement Cloud Forensics CloudTrail log parsing, ELK stack analysis GitHub 20 ProcNet Network Forensics Network traffic analysis, malware investigation, API data capture Medium - d3lt4labs 21 Nuts DFIR File forensics, forensic image analysis itsrad.io 22 Fragility DFIR Exfiltrated file analysis, secret message decoding HTB Forum 23 Exitiabilis DFIR HELK analysis, Cisco AnyConnect VPN compromise HTB Blog 24 Jinkies DFIR Investigation and forensics analysis warlocksmurf 25 LATUS DFIR Multi-artifact forensic investigation HTB Forum 26 Loggy Log Analysis Log aggregation and analysis, timeline construction jon-brandy GitHub
Hard Sherlocks # Sherlock Category Key Techniques Writeup 1 OpTinselTrace-1 APT Investigation Christmas-themed APT, initial access analysis warlocksmurf 2 OpTinselTrace-2 APT Investigation Lateral movement, persistence mechanisms Miranda-Bai GitHub 3 OpTinselTrace-3 APT Investigation Volatility3, Chainsaw, memory + event log correlation Medium - Ari 4 OpTinselTrace-4 APT Investigation Data exfiltration, C2 communication analysis jon-brandy GitHub 5 OpTinselTrace-5 APT Investigation Full APT chain reconstruction, reporting warlocksmurf 6 APTNightmare APT Investigation Advanced persistent threat investigation jon-brandy GitHub 7 APTNightmare2 APT Investigation Continued APT investigation, advanced TTPs Medium - Jake 8 BOughT DFIR Complex forensic investigation warlocksmurf 9 Zenith DFIR Advanced incident response jon-brandy GitHub 10 Payload Malware Analysis Advanced malware analysis, payload extraction jon-brandy GitHub 11 CrashDump DFIR Crash dump analysis, kernel-level forensics jon-brandy GitHub 12 Lupin DFIR Advanced theft/exfiltration investigation jon-brandy GitHub 13 Secret Pictures DFIR Hidden data, steganographic forensics jon-brandy GitHub 14 Malevolent Modmaker Malware Analysis Custom malware module analysis jon-brandy GitHub 15 SalineBreeze-2 DFIR Advanced breach investigation jon-brandy GitHub
Insane Sherlocks # Sherlock Category Key Techniques Writeup 1 Hunter Threat Hunting Full-scale threat hunting operation warlocksmurf 2 Einlansen DFIR Complex multi-vector investigation HTB Forum
Operation Series OpTinselTrace (Christmas 2023 - 5 Parts) Christmas-themed APT investigation following the compromise of Father Christmas’s operations by The Grinch. Five interconnected Sherlocks covering the full attack lifecycle.
Part Focus Difficulty Key Tools OpTinselTrace-1 Initial Access Hard Email analysis, URL investigation OpTinselTrace-2 Execution & Persistence Hard Registry, scheduled tasks OpTinselTrace-3 Lateral Movement Hard Volatility3, Chainsaw OpTinselTrace-4 Data Collection Hard Network forensics, C2 OpTinselTrace-5 Exfiltration & Reporting Hard Full chain reconstruction
Operation Blackout 2025 Sherlock Focus Difficulty Phantom Check Initial investigation Medium Smoke & Mirrors Advanced deception detection Medium
Lockpick Series (Ransomware Evolution) Version Difficulty Focus Lockpick Easy Basic ransomware analysis Lockpick 2.0 Easy Ransomware recovery Lockpick 3.0 Medium Advanced ransomware variant Lockpick 4.0 Medium Latest ransomware evolution
Crown Jewel Series (Active Directory) Version Difficulty Focus Crown Jewel-1 Medium NTDS.dit dump, VSS analysis Crown Jewel-2 Medium Lateral movement detection
Campfire Series (AD Attacks) Version Difficulty Focus Campfire-1 Easy Kerberoasting detection Campfire-2 Easy AS-REP Roasting detection
Heartbreaker Series Version Difficulty Focus Heartbreaker-Continuum Easy Malware static analysis Heartbreaker-Denouement Medium CloudTrail log investigation
Nubilum Series (Cloud Forensics) Version Difficulty Focus Nubilum-1 Medium AWS CloudTrail, EC2, PoshC2 Nubilum-2 Medium Advanced AWS investigation
APTNightmare Series Version Difficulty Focus APTNightmare Hard APT investigation APTNightmare2 Hard Advanced APT TTPs
By Category DFIR (Digital Forensics & Incident Response) Noted, BFT, Recollection, Logjammer, Pikaptcha, SmartyPants, JingleBell, Safecracker, Constellation, TickTock, Hyperfiletable, Ultimatum, Ore, Nuts, Fragility, Exitiabilis, Jinkies, LATUS, BOughT, Zenith, CrashDump, Lupin, Secret Pictures, SalineBreeze-2
Malware Analysis Unit42, Heartbreaker-Continuum, Lockpick (1.0-4.0), Subatomic, Heartbreaker-Denouement, Payload, Malevolent Modmaker
Active Directory Campfire-1, Campfire-2, Crown Jewel-1, Crown Jewel-2, Noxious, Reaper
Network Forensics Meerkat, Knock Knock, Litter, RogueOne, ProcNet, Packet Puzzle
Cloud Forensics Nubilum-1, Nubilum-2, MisCloud, Heartbreaker-Denouement
SOC / Threat Hunting Meerkat, Litter, Tracer, Hunter
Log Analysis Brutus, Logjammer, Loggy
APT Investigation OpTinselTrace (1-5), APTNightmare, APTNightmare2
Key Writeup Repositories Source URL Coverage 0xdf 0xdf.gitlab.io 15+ Sherlocks with deep analysis jon-brandy GitHub 35+ Sherlocks across all difficulties abubakar-shahid GitHub DFIR-focused writeups h0ny GitHub Multi-category Sherlocks warlocksmurf GitHub OpTinselTrace + various Chicken0248 Medium Nubilum, Logjammer, Pikaptcha, Jugglin, Noxious, Knock Knock, Reaper, Ultimatum CyberKatalyst GitHub Sherlock writeup collection Miranda-Bai GitHub Nubilum, OpTinselTrace, Recollection, RogueOne, Noted Thamizhiniyan CS GitBook DFIR, SOC, Malware Analysis Roy Blog Lockpick 3.0, Lockpick 4.0
Investigation Methodology Phase 1: Triage Identify the type of incident (malware, intrusion, data breach, etc.) Determine the scope (affected systems, users, timeframe) Preserve evidence integrity Phase 2: Evidence Collection Collect logs (Windows Event, syslog, application) Collect memory dumps if available Collect disk images or filesystem artifacts Collect network captures Phase 3: Analysis Build a timeline of events Identify IOCs (IPs, domains, hashes, filenames) Trace the attack chain (initial access -> execution -> persistence -> lateral movement -> exfiltration) Map to MITRE ATT&CK framework Phase 4: Reporting Document findings with evidence Provide timeline Recommend containment and remediation Tool Purpose Volatility 3 Memory forensics Chainsaw Windows event log analysis Hayabusa Windows event log fast forensics KAPE Evidence collection Eric Zimmerman Tools Windows artifact parsing (MFTECmd, Registry Explorer, etc.) Autopsy Disk forensics Wireshark/tshark Network capture analysis NetworkMiner Network forensic analysis Velociraptor Endpoint detection & forensics YARA Pattern matching for malware CyberChef Data transformation PEStudio PE file static analysis Ghidra Binary reverse engineering analyzeMFT MFT parsing Event Log Explorer Windows EVTX analysis