Training
Hacking Joomla

Training Overview
The "Hacking Joomla" training is designed to identify security vulnerabilities in Joomla-based websites. This comprehensive training thoroughly examines the structure of Joomla and various vulnerability scanning techniques.
The training begins with the fundamental structure of Joomla applications. You will learn how to scan the Joomla core, its extensions, and themes, and how to identify security vulnerabilities. Throughout the training, methods, tools, and techniques used to identify vulnerabilities in Joomla core components and extensions will be emphasized.
What You Will Learn
- The core structure of the Joomla CMS and its components.
- How to enumerate the Joomla version, extensions, and templates to find vulnerabilities.
- Common misconfigurations and attack vectors specific to Joomla.
- Basic hardening techniques to secure a Joomla installation.
Who is this for?
- Penetration Testers specializing in Content Management Systems (CMS).
- Joomla website administrators and developers.
- Bug Bounty Hunters.
Prerequisites
- Basic knowledge of web technologies (HTML, HTTP).
- Familiarity with the purpose of a CMS.
Tools You Will Use
- JoomScan
- Burp Suite
- Nmap
Training Sections
- Introduction
- The Structure of Joomla
- Joomla User and Authorization System
- Joomla Core Enumeration
- Gathering Information from Extensions
- Gathering Information from Templates
- Joomla Hardening Techniques
- Exam