Back to all tools

Joomscan Cheatsheet

Joomla CMS vulnerability scanner and enumeration tool.

## ๐Ÿงฐ JoomScan Cheatsheet

## โš™๏ธ Installation

Command Description
git clone https://github.com/OWASP/joomscan.git Clone JoomScan repo
cd joomscan Change into cloned directory
chmod +x joomscan.pl Make the script executable
sudo cpan install Bundle::LWP Install required Perl modules
./joomscan.pl Run the tool manually

## ๐Ÿ” Basic Usage

Command Description
./joomscan.pl -u https://example.com Start scan on specified Joomla site
./joomscan.pl -h Show help information
./joomscan.pl --version Display current version
./joomscan.pl --update Update the tool
./joomscan.pl --health Perform internal health check

## ๐Ÿงช Scan Enhancements

Command Description
--random-agent Use a random User-Agent
--user-agent "CustomAgent" Use a custom User-Agent
--rate-limit 10 Throttle requests (10/sec in this case)
--timeout 5 Set request timeout (seconds)
--detect-firewall Detect web application firewall
--enum-users Enumerate Joomla users
--check-vulns Scan for known vulnerabilities
--enum-plugins Enumerate plugins/extensions
--check-config Look for Joomla misconfigurations
--brute --wordlist wordlist.txt Run brute-force test with given wordlist
--find-logs Search for accessible log files
--find-backups Search for common backup file locations

## ๐Ÿ’พ Output and Reporting

Command Description
-o output.txt Save output to file
--output-json Output in JSON format
--store-requests Save HTTP requests/responses
--verbose Enable detailed output
--resume session.json Resume previous scan from session file

## ๐Ÿ“š Target Management

Command Description
-l targets.txt -u https://example.com Load targets from file

โœ… Tip: Always update JoomScan before scanning (--update). Combine with tools like whatweb or nmap for deeper enumeration.