Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
About this site
Welcome to Sandbox99.cc – a space where I share my IT journey, lessons learned, and practical insights. The tagline “Learning IT by Doing, Sharing What I Know” captures the essence of this blog. Every article here is based on my real-world experiences, reflecting what I’ve encountered, solved, and applied in my day-to-day IT work.
Why Sandbox99.cc?
This blog is my digital sandbox – a place to experiment, document, and share the knowledge I’ve gained from hands-on work, training, and personal projects. Unlike traditional resources that might focus on theory, I prefer to write about practical scenarios, offering genuine insights and lessons that others might find useful.
Expand your IT perspective — Follow me on LinkedIn and share your views!
Recent Blog Post
How to Setup Kali Linux in Oracle VirtualBox in Less Than 30 Minutes
🧠 Introduction Kali Linux is a powerful, Debian-based operating system built specifically for penetration testing, digital forensics, and cybersecurity research. Packed with hundreds of pre-installed tools, it’s a favorite among ethical hackers and security...
Why You Should Monitor Your Server: A Look into UptimeRobot Free Tier
Introduction Your website going down is one thing — not knowing it’s down is another. I recently experienced a 10-hour outage on this blog site without noticing. No alerts. No emails. Nothing. I only discovered it after logging in for a routine check. That downtime...
GTFOBins Offline: Essential Post-Exploitation Resource for Ethical Hackers
Introduction In penetration testing and ethical hacking, the post-exploitation phase is where you gain the most insight—and control—over a compromised system. Whether you're escalating privileges, exfiltrating data, or executing commands through seemingly harmless...
NETCONF Fundamentals: Automating Network Configuration with Confidence
Introduction In today’s fast-paced IT landscape, network engineers are shifting from manual, CLI-based management to automated, programmable solutions. At the heart of this transformation is NETCONF (Network Configuration Protocol) — a powerful protocol designed to...
Understanding VLANs: Isolating Traffic in Modern Computer Networks
🧩 Introduction In today’s increasingly complex network environments, efficiency, security, and scalability are more than just buzzwords—they’re fundamental design requirements. One of the foundational technologies that helps achieve all three is the Virtual Local Area...
Cisco Hierarchical Three-Tier Model: Scalable Network Design for Modern Enterprises
🚀 Introduction In modern enterprise environments, designing a robust, scalable, and manageable network infrastructure is essential. Cisco’s Hierarchical Network Design Model provides a proven framework to achieve these goals. By organizing a network into distinct...






