Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
About this site
Welcome to Sandbox99.cc – a space where I share my IT journey, lessons learned, and practical insights. The tagline “Learning IT by Doing, Sharing What I Know” captures the essence of this blog. Every article here is based on my real-world experiences, reflecting what I’ve encountered, solved, and applied in my day-to-day IT work.
Why Sandbox99.cc?
This blog is my digital sandbox – a place to experiment, document, and share the knowledge I’ve gained from hands-on work, training, and personal projects. Unlike traditional resources that might focus on theory, I prefer to write about practical scenarios, offering genuine insights and lessons that others might find useful.
Expand your IT perspective — Follow me on LinkedIn and share your views!
Recent Blog Post
Installing Python 3.10.12 on Kali Linux: A Safe, Side-by-Side Setup Guide
🧩 Introduction While Kali Linux often ships with the latest version of Python pre-installed, certain tools and projects may require compatibility with older versions. In this quick guide, we’ll walk through the process of installing Python 3.10.12 alongside the...
🛠 Metasploit Cheat Sheet: A Quick Guide for Ethical Hackers
Introduction Metasploit is one of the most powerful tools in an ethical hacker’s arsenal. Whether you're performing a penetration test or competing in a Capture The Flag (CTF) event, Metasploit streamlines the process of identifying, exploiting, and gaining control of...
Level Up: Using sqlmap and ZAP for SQL Injection Testing in DVWA
🧨 Introduction In our previous blog post, we successfully demonstrated a classic SQL Injection attack against DVWA (Damn Vulnerable Web Application) using its interactive web interface under security level: low. That exercise helped us understand how vulnerable input...
Testing SQL Injection in DVWA: A Hands-On Tutorial
🛡️ Introduction SQL Injection (SQLi) is one of the most dangerous and commonly exploited web application vulnerabilities. It occurs when an application unsafely includes user input in SQL queries, allowing attackers to tamper with database queries, extract sensitive...
Mastering Force Browse in Practice
Introduction In the intricate world of web application security, "force Browse" stands as a fundamental technique for uncovering hidden vulnerabilities. It's the art of systematically guessing or predicting URLs, directories, and files that might not be directly...
From Spidering to Force Browsing: Expanding Your Reconnaissance with OWASP ZAP
Introduction Web application security testing is a critical practice for identifying and mitigating vulnerabilities before they can be exploited. A fundamental step in this process is reconnaissance – gathering as much information as possible about the target...