Introduction In our previous post, we demonstrated how to set up a basic Ansible demo environment with a control node and a target In the previous post, we built a basic Ansible demo environment with a control node and a target node. Now it’s time to write your first...
Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
Author: Jose Mendez
Getting Started with Ansible: Initial Setup Guide
Introduction Ansible is an open-source IT automation tool developed by Michael DeHaan and later acquired by Red Hat in 2015. It is designed to simplify automation tasks such as configuration management, application deployment, and orchestration of complex workflows....
Linux Firewall Defense: A Scripted Approach to Secure IPTables
Introduction In a previous blog post, I introduced iptables as a foundational tool for Linux firewall management. While understanding the basic syntax is crucial, it's equally important to harden your firewall — reducing your attack surface and enforcing security at...
Persistent Log Management: Dump JSON Logs into SQLite
Introduction In the world of self-hosted applications and microservices, structured logging is essential for debugging, monitoring, and long-term storage. JSON logs, like those generated by Authelia, are machine-readable but can become difficult to manage as they grow...
Linux Firewall: Automatically Ban and Unban IP Addresses with Python
In the world of cybersecurity, quick action can make all the difference. I've just published a new blog post where I share a practical Python script that temporarily bans and unbans IP addresses on a Linux system. It uses UFW as the primary firewall and falls back to...
Beginner’s Guide to Exploiting MS17-010 on TryHackMe Blue
Introduction 🧠 Difficulty🛠️ Tools Used🎯 Focus Area🧩 Skills GainedBeginnerKali, Nmap, MetasploitVulnerability ExploitationEnumeration, Exploitation, Privilege Escalation In this walk-through, we’ll explore the “Blue” room on TryHackMe — a beginner-friendly challenge...






