Learning to enumerate Joomla CMS and exploit SQL Injection vulnerability to get a reverse shell. Exploit the human weakness of password reuse and pivot to a higher privilege user.
No download links available.