Joomla
Footprinting
# Confirm that site is running Joomla
curl -s <http://site.local/> | grep Joomla
# Fingerprint joomla version
curl -s <http://site.local/README.txt> | head -n 5
curl -s <http://site.local/administrator/manifests/files/joomla.xml> | xmllint --format -
# cache.xml can give us approximate version, it is located at plugins/system/cache/cache.xml.Enumeration
# Droopescan installation
sudo pip3 install droopescan
# Normal scan
droopescan scan joomla --url <http://site.local/>
# Brute Forcing password
# joomla-brute
# LNK : <https://github.com/ajnik/joomla-bruteforce>
sudo python3 joomla-brute.py -u <http://site.local> -w /usr/share/metasploit-framework/data/wordlists/http_default_pass.txt -usr adminAttacking Joomla
Code Execution
Last updated