In this chapter, we started by discussing the architecture of WordPress, followed by the directory structure. Next, we learned how to perform manual and automated recon of WordPress. Later, we looked at examples of a few exploits and did a step-by-step walkthrough of the entire exploitation process manually as well as using Metasploit modules.
In the next chapter, we'll be learning about performing a penetration test on a Joomla-based Content Management System (CMS).