Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
About this site
Welcome to Sandbox99.cc – a space where I share my IT journey, lessons learned, and practical insights. The tagline “Learning IT by Doing, Sharing What I Know” captures the essence of this blog. Every article here is based on my real-world experiences, reflecting what I’ve encountered, solved, and applied in my day-to-day IT work.
Why Sandbox99.cc?
This blog is my digital sandbox – a place to experiment, document, and share the knowledge I’ve gained from hands-on work, training, and personal projects. Unlike traditional resources that might focus on theory, I prefer to write about practical scenarios, offering genuine insights and lessons that others might find useful.
Expand your IT perspective — Follow me on LinkedIn and share your views!
Recent Blog Post
Metasploit Demystified: A Core Tool for Every IT Professional’s Arsenal
Why Metasploit Matters to IT Professional In today's interconnected world, the threat landscape is a constantly shifting battleground. As an IT professional, you're on the front lines, whether you're managing servers, securing networks, or developing applications....
Mastering Web Security: A Deep Dive into Damn Vulnerable Web App (DVWA) on Kali Linux
Introduction In the ever-evolving landscape of cybersecurity, hands-on experience is paramount. While theoretical knowledge forms the foundation, it's the practical application of techniques that truly sharpens a security professional's skills. As many of you know...
Linux Privilege Escalation via Sudo: Understanding and Mitigation
Introduction Privilege escalation is a critical concept in cybersecurity, referring to the act of gaining elevated access to resources that are normally protected from an application or user. In the Linux ecosystem, one of the most common and powerful mechanisms for...
PHP Security 101: Avoiding Code Injection and Remote Access Risks
Introduction PHP, one of the most widely used server-side scripting languages, is often the target of web-based attacks due to its dynamic execution features and flexibility. Among the most critical vulnerabilities affecting PHP applications is PHP Code Injection,...
Mastering Web Vulnerabilities: A Kali Linux Guide to bWAPP with Docker
Unveiling bWAPP – Your Bee-autifully Buggy Web Application for Security Training In the dynamic world of cybersecurity, hands-on experience is paramount. While countless theoretical resources exist, truly understanding web vulnerabilities requires a safe, controlled...
Mastering the Digital Battlefield: File & Directory Commands for Cybersecurity Pros
Introduction: Mastering the Digital Terrain In the vast and ever-evolving landscape of cybersecurity, a fundamental understanding of how to navigate and manipulate file systems is not just an advantage – it's an absolute necessity. Whether you're conducting a...






