We started this chapter by discussing the architecture of Drupal, as well as the directory structure. Then, we learned how to perform reconnaissance of Drupal both manually and automatically. After that, we looked at examples of two exploits and did a step-by-step walkthrough of the entire exploitation process.
In the next chapter, we will look at the enumeration and exploitation of JBoss servers.