3.-Joomla-discovery-and-enumeration
. Basic Joomla Identification
curl -s http://dev.inlanefreight.local/ | grep Joomla # Check for Joomla in HTML source
curl -s http://dev.inlanefreight.local/robots.txt # Check robots.txt for disallowed directories
curl -s http://dev.inlanefreight.local/README.txt # Check for version information
curl -s http://dev.inlanefreight.local/administrator/manifests/files/joomla.xml # Detailed version info
curl -s http://dev.inlanefreight.local/plugins/system/cache/cache.xml # Approximate version info
curl -I http://dev.inlanefreight.local/favicon.ico # Check for Joomla default favicon.2. Joomla Version Enumeration
curl -s https://developer.joomla.org/stats/cms_version | python3 -m json.tool # Joomla usage stats API
curl -I http://dev.inlanefreight.local/ | grep "X-Content-Encoded-By" # Joomla HTTP headers for version info
curl -s http://dev.inlanefreight.local/CHANGELOG.php # Check for changelog3. Automated Scanning
Droopescan
sudo pip3 install droopescan
droopescan -h
droopescan scan joomla --url http://dev.inlanefreight.local/JoomlaScan (Python 2.7)
4. Joomla Login Brute-Force
5. Extension Enumeration (Manual)
6. Configuration File & Backup File Checks
7. Directory & File Enumeration
8. Joomla REST API Enumeration (If Enabled)
9. Joomla CLI (If Accessible)
10. Exploiting Known Joomla Vulnerabilities
SQL Injection (CVE-2017-8917)
Unauthenticated Admin Takeover (CVE-2023-23752)
11. Joomla User Enumeration
12. Joomla Debug Mode & Log File Checks
13. Extracting Sensitive Data from Logs
14. Checking for Default Credentials
15. Important Considerations
Last updated