Last updated: December 31, 2022
Joomscan Security Scanner is a website audit tool for Joomla. It is written in Perl and it is able to detect more than 550 vulnerabilities like file inclusions, SQL injections, RFI flaws, BIA, XSS flaw, blind SQL injection, protection of directories and others.
Joomscan is intended for IT security professionals and administrators of Joomla sites.
The main features of Joomscan
- Joomla version detection.
- Detection and enumeration of components, plugins and vulnerable modules.
- Posting a defensive note to properly secure your website.
Joomscan installation
Joomscan is available under the Kali linux distribution. If you have a Windows computer then I advise you before going any further to install a Linux distribution (like Kali Linux) on a virtual machine. Just download VMware and an image of Kali Linux. here is how to install Kali Linux on a Windows machine with VMware.
If you have another distribution then you can still download it with the following commands:
cd joomscan
perl joomscan.pl
Find vulnerabilities on a joomla site
After installing Joomscan, the analysis is started using a command line, passing the domain of your site as an argument:
# perl joomscan.pl –u mysite.com
After an analysis, joomscan deduces the version of my joomla portal.
Then it displays the vulnerable components and the description of each flaw that can be easily exploited by a hacker.
In my case I found 4 flaws on my Joomla site, not bad already.
Otherwise for the correction of Joomla flaws found, it depends on the type of flaw. For me, it only took a few updating and deactivation of a component and everything was back to normal.
You can also display a small defensive note, it is very useful for secure your Joomla site.
There are other optional options for joomscan such as:
-x = if you want use a proxy
-ot = copy the result of the analysis to a txt file
-Oh = copy the result of the analysis to an html web page
Make good use of this tool, remember to make regular backups of your site and take action before it's too late.
I don't see why you popularize this kind of information!
we were taken down our website all our projects investment in time and money our team found themselves unemployed because of the kind of info that you popularize and you put in the hands of little idiots who have fun knocking it down sites without taking into account the company behind it!!! to hell with all that! I suffer from it and I can't sleep at night! Also explain that this kind of practice mess up the lives of people see entire families who live on legal e-commerce websites! It's not because we sometimes forget to lock the door that everyone has the right to go into people's homes! FUK
The articles of funinformatique aims to inform users about hacking techniques and to help them better protect themselves, not to annoy people. Learn to attack to better defend themselves.
I wonder how a company can create an ecommerce site if it does not have the necessary skills on the basics of hacking and pentesting. And to have these notions and to be formed, it is necessary to read the articles of the blogs and the documents.
It is easier to blame our failures on others.
If you code with your feet and especially by making customers pay… No, but seriously, you're not ashamed to come and cry here that way!!! Luckily guys and companies like yours are going out of business otherwise our personal info wouldn't have anything personal and our cards would be on all the blackmarkets...
What a shame to come and write this...
Hello,
I managed to install perl on Windows, launched the book … and I had the scan.
except that it only shows me the last results once finished, and I can't manage in the command prompt to do -ot
what exactly should be done?