Skip to content
Charles Asirifi
Charles Asirifi
  • Home
  • Portfolio
  • Contact
Charles Asirifi
Charles Asirifi
  • Home
  • Portfolio
  • Contact

Phishing Analysis Lab 2

Leave a Comment / Cybersecurity, cybersecurity labs, Log Analysis / charles

Scenario You have been sent a phishing link – It is your task to investigate this website and find out […]

Phishing Analysis Lab 2 Read More »

Phishing Analysis Lab 1

Leave a Comment / Uncategorized / charles

Scenario You have been sent a phishing link — It is your task to investigate this website and find out

Phishing Analysis Lab 1 Read More »

Digital Forensics – Yurei Lab

Leave a Comment / cybersecurity labs, Digital Forensics / charles

Scenario I’m Loner Varley, currently employed at Tech Innovator Inc., a cybersecurity start-up. Our company’s name may sound a bit

Digital Forensics – Yurei Lab Read More »

SOC Alpha 2

Leave a Comment / SIEM / charles

Scenario You are provided with use-cases to conduct some proactive searches in ELK. Answer the following questions by using the

SOC Alpha 2 Read More »

Venom Lab: Investigating Compromised Ubuntu Server

Leave a Comment / Cybersecurity, Log Analysis / charles

Scenario We got you the /var/log folder of one of the compromised ubuntu server. Investigate the logs and figure out the

Venom Lab: Investigating Compromised Ubuntu Server Read More »

Snowflake lab: Unearthing Criminal Activities via Server Logs

Leave a Comment / Log Analysis / charles

Scenario It was recently discovered that one of our web application servers had been compromised, and the IMP Incident Response

Snowflake lab: Unearthing Criminal Activities via Server Logs Read More »

← Previous 1 2 3 4 Next →

Based in Canada - Working World Wide | Copyright © 2026 Charles Asirifi | DevOps