Revision Intermediate BTL1 / Certification / Exam Prep

BTL1 � Blue Team Level 1

A revision reference for the Security Blue Team BTL1 certification � a 24-hour practical exam covering phishing analysis, threat intelligence, DFIR, SIEM, and incident response. Notes, key tools, and practical tips for each domain.

24-hour practical exam Pass mark: 70% (Silver 80%, Gold 90%) Security Blue Team

// Exam Overview

BTL1 is a practical, hands-on certification from Security Blue Team. Unlike CompTIA exams, there are no multiple-choice questions � you're given a real incident scenario and must investigate, answer questions, and write a report within 24 hours.

DetailValue
Exam format24-hour practical lab environment + report submission
Pass mark70% (Silver: 80%, Gold: 90%)
Exam domainsPhishing Analysis, Threat Intelligence, DFIR, SIEM, Incident Response
Primary SIEM toolSplunk
Primary forensics toolAutopsy
Report requiredYes � write up findings as an incident report
Open bookYes � you can use notes, Google, and reference materials during the exam

The exam is open book. This means the challenge is not memorising facts � it's knowing how to use tools effectively, how to interpret what you find, and how to write clear, professional findings. Speed and methodology matter more than rote knowledge.

// Phishing Analysis

One of the core BTL1 domains. You'll analyse suspicious emails, extract artefacts, check them against threat intel, and write up your findings.

Phishing analysis process

StepAction
1. Safe handlingOpen the email in a sandbox environment � never click links or open attachments on a live machine
2. Examine headersCheck SPF / DKIM / DMARC results, trace Received chain, note sending IP and domain
3. Check From vs Reply-ToMismatch is a strong spoofing indicator
4. Extract URLsDefang and check against VirusTotal, URLscan.io, PhishTank
5. Extract attachmentsHash the file (MD5 + SHA256), check VirusTotal, submit to Any.run sandbox
6. Check domainsWHOIS registration date, MXToolbox, VirusTotal passive DNS
7. Document IOCsList all IPs, domains, URLs, hashes in defanged format
8. Determine verdictPhishing / Spear phishing / Benign � with justification

Email artefact types

ArtefactWhere to find it
Sending IPFirst external Received header (bottom of chain you trust)
Sending domainFrom header, Return-Path, MAIL FROM in headers
URLsEmail body � hover without clicking, or view source
Attachment hashSave file, run Get-FileHash -Algorithm SHA256 (Windows) or sha256sum (Linux)
X-Originating-IPSome providers include the sender's actual IP here
X-MailerTool used to send � phishing toolkits leave identifiable strings

// Threat Intelligence

BTL1 tests your ability to use threat intelligence platforms to enrich IOCs and understand the threat context behind them.

Key platforms to know

PlatformWhat to use it for
VirusTotalHash, URL, IP, domain lookups � see detections from 70+ AV engines and OSINT context
AbuseIPDBIP reputation � check reports of malicious activity for a given IP
URLscan.ioSubmit URLs for sandboxed rendering � see what a page looks like, redirects, and scripts
ShodanInternet scan data � see open ports and services on a given IP, identify the host type
MITRE ATT&CKMap attacker behaviour to techniques and tactics � use for threat actor profiling
MXToolboxEmail header analysis, DNS record lookups, SPF/DKIM/DMARC checking, blacklist lookup
Any.runInteractive malware sandbox � run suspicious files and see behaviour in real time
Talos IntelligenceCisco's threat intelligence � email sender reputation, IP/domain reputation, threat advisories
WHOISDomain registration info � check creation date, registrar, contact details

IOC defanging reference

IOC Defanging Examples
URL:    hxxp://evil[.]com/payload.exe
IP:     185[.]220[.]101[.]42
Email:  attacker[@]evil[.]com
Domain: malware[.]ru

// Digital Forensics & Incident Response

BTL1 DFIR tasks typically involve Autopsy for disk forensics and Volatility for memory forensics. You'll be given an image or memory dump and asked specific investigative questions.

Autopsy � key actions

TaskHow to do it in Autopsy
Create a caseFile ? New Case ? add data source (disk image, local disk, logical files)
Find deleted filesData Sources ? right-click image ? Extract Unallocated Space, or browse file tree with "Del" indicator
Browse file systemFile tree in left panel � navigate to directories of interest (/Users, /Windows/Temp, etc.)
Timeline analysisTools ? Timeline � view file system activity over time, filter by date range
Extract browser historyResults ? Extracted Content ? Web History / Web Downloads / Web Cookies
Search for keywordsKeyword Search module � search across all indexed content
View registry hivesWindows registry files auto-parsed � check Results ? OS Accounts, Recent Documents, USB Devices

Volatility � common commands

Volatility 3
# Identify the OS from the memory dump
python3 vol.py -f memory.vmem windows.info

# List running processes
python3 vol.py -f memory.vmem windows.pslist
python3 vol.py -f memory.vmem windows.pstree

# List network connections
python3 vol.py -f memory.vmem windows.netstat

# Scan for injected code / hidden processes
python3 vol.py -f memory.vmem windows.malfind

# Dump a process for further analysis
python3 vol.py -f memory.vmem windows.procdump --pid 1234 --dump-dir ./output/

# Check loaded DLLs for a process
python3 vol.py -f memory.vmem windows.dlllist --pid 1234

# Extract command-line arguments for processes
python3 vol.py -f memory.vmem windows.cmdline

# Check registry hives loaded
python3 vol.py -f memory.vmem windows.registry.hivelist

# Extract hashed credentials
python3 vol.py -f memory.vmem windows.hashdump

// SIEM � Splunk

BTL1 uses Splunk for SIEM tasks. You'll need to search across log data to answer investigative questions � know your SPL fundamentals.

Core SPL commands

Splunk SPL
# Basic search � all events from a source
index=windows sourcetype=WinEventLog

# Search with field filters
index=windows EventCode=4625 user=admin

# Count events by field
index=windows EventCode=4625 | stats count by src_ip

# Find top values
index=windows | top limit=10 user

# Time-based search
index=windows earliest=-24h@h latest=now EventCode=4688

# Search for a string across all indexes
index=* "192.168.1.100"

# Rename fields and format output
index=windows EventCode=4625 | stats count as FailedLogins by src_ip, user | sort -FailedLogins

# Rex � extract fields with regex
index=web_logs | rex field=_raw "(?P\d+\.\d+\.\d+\.\d+)"

# Transaction � group related events
index=windows EventCode=4625 OR EventCode=4624 | transaction user maxspan=5m

# Timechart � events over time
index=windows EventCode=4625 | timechart count span=1h

Common log sourcetypes in BTL1

SourcetypeContains
WinEventLogWindows Event Log � Security, System, Application logs
syslogLinux system logs
access_combinedApache/web server access logs
suricataSuricata IDS alerts from network traffic

// Incident Response

BTL1 IR tasks ask you to apply the incident response lifecycle to a given scenario � determining what happened, when, and how to respond.

IR phases (PICERL)

PhaseKey actions for BTL1
PreparationKnow your tools, playbooks, and escalation paths � this happens before the exam
IdentificationAnalyse alerts, logs, artefacts � determine if an incident has occurred and what type
ContainmentIsolate affected systems, block malicious IPs/domains at the firewall, disable compromised accounts
EradicationRemove malware, revoke attacker access, patch the exploited vulnerability
RecoveryRestore from clean backup, verify system integrity, return to production
Lessons LearnedDocument timeline, root cause, what worked, what didn't � update playbooks

Incident report structure

BTL1 requires a written report. A strong report includes:

SectionWhat to include
Executive SummaryOne paragraph � what happened, impact, current status. Non-technical.
Incident TimelineChronological list of events with timestamps � when was it detected, what happened, what was done
Technical AnalysisDetail of your investigation � what logs showed, tools used, what you found
IOCsAll extracted indicators in defanged format � IPs, domains, hashes, URLs
Containment actionsWhat was blocked/isolated and when
RecommendationsSpecific, actionable � patch X, block Y, implement Z control

// Key Tools Summary

ToolDomainPurpose
AutopsyDFIRDisk image forensics � file recovery, browser history, registry, timeline
Volatility 3DFIRMemory forensics � processes, network, injected code, credentials
SplunkSIEMLog searching and analysis using SPL queries
WiresharkDFIR / NetworkPCAP analysis � packet inspection, stream following, protocol dissection
VirusTotalThreat IntelFile hash, IP, domain, URL reputation
AbuseIPDBThreat IntelIP reputation and abuse reports
URLscan.ioPhishingSafe URL inspection and rendering
MXToolboxPhishingEmail headers, SPF/DKIM/DMARC, DNS lookup
Any.runPhishing / DFIRInteractive malware sandbox
MITRE ATT&CK NavigatorThreat IntelMap findings to TTPs, identify coverage gaps

// Exam Tips

Read all the questions before starting. With 24 hours you have time � scan through all the questions first. Some answers you'll find incidentally while investigating something else. Knowing what you're looking for shapes your investigation.

Write your report as you go. Don't leave the report to the end. Document each finding as you discover it � timeline entries, tool outputs, IOCs. You'll thank yourself at hour 20 when you're tired.

Note timestamps carefully. BTL1 questions often ask when something happened. Always record the full timestamp (including timezone) for every event you find. UTC vs local time errors are a common mistake.

The Silver coin matters. A pass (70%) earns your certification, but Silver (80%) unlocks the BTL1 coin � a physical coin sent to your door. Worth pushing for. Gold (90%) is a stretch goal for the most prepared candidates.

Practice with the SBT labs before exam day. Security Blue Team provides training labs for each domain as part of the BTL1 course. Don't skip them � the exam scenarios are built around the same toolset and methodology. If you can complete the labs confidently, you're ready.