Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
About this site
Welcome to Sandbox99.cc – a space where I share my IT journey, lessons learned, and practical insights. The tagline “Learning IT by Doing, Sharing What I Know” captures the essence of this blog. Every article here is based on my real-world experiences, reflecting what I’ve encountered, solved, and applied in my day-to-day IT work.
Why Sandbox99.cc?
This blog is my digital sandbox – a place to experiment, document, and share the knowledge I’ve gained from hands-on work, training, and personal projects. Unlike traditional resources that might focus on theory, I prefer to write about practical scenarios, offering genuine insights and lessons that others might find useful.
Expand your IT perspective — Follow me on LinkedIn and share your views!
Recent Blog Post
Beyond Encryption: How Zero-Knowledge Proofs are Revolutionizing Data Privacy
The Paradox of Privacy and Verification Have you ever needed to prove something about yourself without revealing the underlying sensitive information? Imagine trying to prove you're old enough to buy a certain product without showing your exact birthdate, or verifying...
Mastering Symbolic Links: A Linux File Management Essential
Introduction Hook: Ever wondered how some files seem to exist in multiple places at once on your Linux system? Or how software can find its libraries even if they're moved, seemingly without breaking? Enter the humble, yet powerful, symbolic link! Often overlooked,...
Mastering Curl in Kali Linux: Your Go-To Tool for Network Interaction and Ethical Hacking Part 2
I. Advanced Curl Techniques for Ethical Hacking This is our previous blogs related to curl. Beyond basic reconnaissance, curl truly shines when you need to craft custom HTTP requests, simulate complex user interactions, or bypass certain security measures. This is...
Beyond the Browser: Escalating from Mutillidae II Web Exploits to Root Access
Introduction Mutillidae II is a deliberately vulnerable web application, meaning it's designed to help you learn and practice various web exploitation techniques, including those that can lead to privilege escalation on the underlying operating system. It's important...
Docker Privilege Escalation: Understanding Container Security Boundaries
Introduction In the rapidly evolving landscape of containerized applications, Docker has become the de facto standard for deploying and managing applications across diverse environments. While Docker provides significant benefits in terms of portability, scalability,...
The Silent Detective: Mastering Passive Information Gathering
Introduction Imagine knowing almost everything about your target – their digital footprint, the technologies they use, even potential weak points – all before they even know you're looking. This isn't science fiction; it's the power of passive information gathering, a...






