🧭 Introduction In this demonstration, we explore one of the most dangerous yet commonly found web vulnerabilities—Stored Cross-Site Scripting (XSS). Unlike its reflected counterpart, stored XSS involves injecting malicious scripts that are permanently stored on the...
Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
Nmap Cheat Sheet: Essential Scans for Ethical Hackers and Network Admins
🧹 Introduction Nmap (Network Mapper) is a powerful open-source tool used by ethical hackers, network administrators, and security professionals for network discovery and security auditing. Whether you're scanning for open ports, fingerprinting services, or detecting...
Installing Python 3.10.12 on Kali Linux: A Safe, Side-by-Side Setup Guide
🧩 Introduction While Kali Linux often ships with the latest version of Python pre-installed, certain tools and projects may require compatibility with older versions. In this quick guide, we’ll walk through the process of installing Python 3.10.12 alongside the...
🛠 Metasploit Cheat Sheet: A Quick Guide for Ethical Hackers
Introduction Metasploit is one of the most powerful tools in an ethical hacker’s arsenal. Whether you're performing a penetration test or competing in a Capture The Flag (CTF) event, Metasploit streamlines the process of identifying, exploiting, and gaining control of...
Level Up: Using sqlmap and ZAP for SQL Injection Testing in DVWA
🧨 Introduction In our previous blog post, we successfully demonstrated a classic SQL Injection attack against DVWA (Damn Vulnerable Web Application) using its interactive web interface under security level: low. That exercise helped us understand how vulnerable input...
Testing SQL Injection in DVWA: A Hands-On Tutorial
🛡️ Introduction SQL Injection (SQLi) is one of the most dangerous and commonly exploited web application vulnerabilities. It occurs when an application unsafely includes user input in SQL queries, allowing attackers to tamper with database queries, extract sensitive...