Introduction Ten years ago, I stumbled upon something that genuinely blew my mind. It was Conky, running on my Linux desktop, and I was absolutely amazed. Imagine a real-time dashboard of your system's resources, seamlessly integrated into your wallpaper, updating...
Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
Categories: Cybersecurity
How to Setup Kali Linux in Oracle VirtualBox in Less Than 30 Minutes
🧠 Introduction Kali Linux is a powerful, Debian-based operating system built specifically for penetration testing, digital forensics, and cybersecurity research. Packed with hundreds of pre-installed tools, it’s a favorite among ethical hackers and security...
Stored XSS Explained: A Hands-On Demo with DVWA and OWASP ZAP
🧭 Introduction In this demonstration, we explore one of the most dangerous yet commonly found web vulnerabilities—Stored Cross-Site Scripting (XSS). Unlike its reflected counterpart, stored XSS involves injecting malicious scripts that are permanently stored on the...
Nmap Cheat Sheet: Essential Scans for Ethical Hackers and Network Admins
🧹 Introduction Nmap (Network Mapper) is a powerful open-source tool used by ethical hackers, network administrators, and security professionals for network discovery and security auditing. Whether you're scanning for open ports, fingerprinting services, or detecting...
Level Up: Using sqlmap and ZAP for SQL Injection Testing in DVWA
🧨 Introduction In our previous blog post, we successfully demonstrated a classic SQL Injection attack against DVWA (Damn Vulnerable Web Application) using its interactive web interface under security level: low. That exercise helped us understand how vulnerable input...
Testing SQL Injection in DVWA: A Hands-On Tutorial
🛡️ Introduction SQL Injection (SQLi) is one of the most dangerous and commonly exploited web application vulnerabilities. It occurs when an application unsafely includes user input in SQL queries, allowing attackers to tamper with database queries, extract sensitive...