Introduction In the world of system administration, networking, and cybersecurity, efficiency and precision are not just goals—they're necessities. The command line is your most powerful ally, and mastering it can turn complex, manual tasks into simple, automated...
Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
Categories: Cybersecurity
The Unnecessary Service: Disabling LLMNR on Your Public Server
Introduction Running a public-facing server requires constant vigilance, especially when it comes to security. While we often focus on the big-ticket items like firewalls and web server configurations, sometimes it's the smaller, less-known services that can open the...
Conky: My Decade-Long Desktop Sentinel
Introduction Ten years ago, I stumbled upon something that genuinely blew my mind. It was Conky, running on my Linux desktop, and I was absolutely amazed. Imagine a real-time dashboard of your system's resources, seamlessly integrated into your wallpaper, updating...
How to Setup Kali Linux in Oracle VirtualBox in Less Than 30 Minutes
🧠 Introduction Kali Linux is a powerful, Debian-based operating system built specifically for penetration testing, digital forensics, and cybersecurity research. Packed with hundreds of pre-installed tools, it’s a favorite among ethical hackers and security...
Stored XSS Explained: A Hands-On Demo with DVWA and OWASP ZAP
🧭 Introduction In this demonstration, we explore one of the most dangerous yet commonly found web vulnerabilities—Stored Cross-Site Scripting (XSS). Unlike its reflected counterpart, stored XSS involves injecting malicious scripts that are permanently stored on the...
Nmap Cheat Sheet: Essential Scans for Ethical Hackers and Network Admins
🧹 Introduction Nmap (Network Mapper) is a powerful open-source tool used by ethical hackers, network administrators, and security professionals for network discovery and security auditing. Whether you're scanning for open ports, fingerprinting services, or detecting...






