Joomla
Tools
Resources
Discovery/Footprinting
#Verify if Joomla is installed
Intrusionz3r0@htb[/htb]$ curl -s http://dev.inlanefreight.local/ | grep Joomla
#Check the robots.txt
Intrusionz3r0@htb[/htb]$ curl -s 'http://app.inlanefreight.local/robots.txt'
#Check the Joomla version through Readme.txt
Intrusionz3r0@htb[/htb]$ curl -s http://dev.inlanefreight.local/README.txt | head -n 5
#Fingerprint the version from files
#In /administrator/manifests/files/joomla.xml you can see the version.
#In /language/en-GB/en-GB.xml you can get the version of Joomla.
#In plugins/system/cache/cache.xml you can see an approximate version.
Intrusionz3r0@htb[/htb]$ curl -s http://dev.inlanefreight.local/administrator/manifests/files/joomla.xml | xmllint --format -
#Run joomlascan
Intrusionz3r0@htb[/htb]$ python2.7 joomlascan.py -u http://dev.inlanefreight.local
#Joomla Bruteforce agains the admin panel
Intrusionz3r0@htb[/htb]$ sudo python3 joomla-brute.py -u http://app.inlanefreight.local/ -w /usr/share/wordlists/rockyou.txt -usr admin
Remote Command Execution
Last updated