Skip to content
Charles Asirifi
Charles Asirifi
  • Home
  • Portfolio
  • Contact
Charles Asirifi
Charles Asirifi
  • Home
  • Portfolio
  • Contact

Digital Forensics – Yurei Lab

Leave a Comment / cybersecurity labs, Digital Forensics / charles

Scenario I’m Loner Varley, currently employed at Tech Innovator Inc., a cybersecurity start-up. Our company’s name may sound a bit […]

Digital Forensics – Yurei Lab Read More »

SOC Alpha 2

Leave a Comment / SIEM / charles

Scenario You are provided with use-cases to conduct some proactive searches in ELK. Answer the following questions by using the

SOC Alpha 2 Read More »

Venom Lab: Investigating Compromised Ubuntu Server

Leave a Comment / Cybersecurity, Log Analysis / charles

Scenario We got you the /var/log folder of one of the compromised ubuntu server. Investigate the logs and figure out the

Venom Lab: Investigating Compromised Ubuntu Server Read More »

Snowflake lab: Unearthing Criminal Activities via Server Logs

Leave a Comment / Log Analysis / charles

Scenario It was recently discovered that one of our web application servers had been compromised, and the IMP Incident Response

Snowflake lab: Unearthing Criminal Activities via Server Logs Read More »

Nonyx: Reverse Engineering Malware Code

Leave a Comment / Reverse Engineering / charles

Lab Scenario Exorcise Black Energy 2 from Shadowbrook’s digital infrastructure by reverse-engineering the malware’s code. You must dismantle its hooks,

Nonyx: Reverse Engineering Malware Code Read More »

Wireshark project

SOC: Vortex Lab Walkthrough

Leave a Comment / Uncategorized / charles

Scenario Jake, a Transgear Corp Incident Response analyst, delves into an alert from Brianna, who flagged unusual activity on her

SOC: Vortex Lab Walkthrough Read More »

← Previous 1 2 3 4 Next →

Based in Canada - Working World Wide | Copyright © 2026 Charles Asirifi | DevOps