In this chapter, we learned about the Joomla architecture and its files and directory structure. Then, we moved on to the reconnaissance process and understood different ways of finding a Joomla instance and its version number. We also looked at tools and scripts that automate the process for us. Finally, we studied the in-depth process of Joomla exploitation and how the exploitation works using examples of previously discovered public exploits.
In the next chapter, we'll learn about performing a pen test on another popular CMS—Drupal.