OWASP Joomla Vulnerability Scanner- Backtrack 5

Website reflects the image of an organizations, there are millions of websites available on the Internte. Content management system (CMS) is one of the best platform for websites specially for blogging purposes. WordPress and Joomla are two famous CMS so the security is very important for both CMS. For wordpress as discussed about Wpscan and for joomla we have OWASP Joomla web vulnerability scanner.

Joomla vulnerability scanner is also available on Backtrack 5, so before going to the tutorial here is the quick introduction of joomla and joomla vulnerability scanner.

What Is Joomla ?

Joomla is a widely used CMS that provides effective features and it is easy to deploy, it can be used for multiple purposes like for E-commerce, Shopping and for forum. Joomla has basic four extension.
  • Component
  • Modules
  • Plugins
  • Theme
A large community are using Joomla for their websites use this google dork to find out.
Joomla has its own team to secure this CMS, this team called JSST (Joomla security strike team), the team is responsible to find out and fix the vulnerabilities.

Joomla Vulnerability Scanner

A signature-based scanner that can detect file inclusion, sql injection, command execution, XSS, DOS, directory traversal vulnerabilities of a target Joomla! web site using known vulnerability database.


If you are using Backtrack 5 than you dont need to download it you can get it from Applications–>Backtrack–>Vulnerability Assessment–>Web Application assessment–>CMS vulnerabilities identification–>Joomscan

Joomla Vulnerability Scanner Tutorial

The usage is very simple even you can use it own Windows, Linux and MAC platform because it requires only perl script to run this program.
./joomscan.pl -u victim.com -x localhost:8080

If you have any question regarding anything than please do ask via comment box.

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...