![Use JoomScan to scan Joomla for vulnerabilities on Kali - Linux Tutorials - Learn Linux Configuration Use JoomScan to scan Joomla for vulnerabilities on Kali - Linux Tutorials - Learn Linux Configuration](https://linuxconfig.org/wp-content/uploads/2021/01/04-use-joomscan-to-scan-joomla-for-vulnerabilities-on-kali.png)
Use JoomScan to scan Joomla for vulnerabilities on Kali - Linux Tutorials - Learn Linux Configuration
![Richard is working on a web app pen testing assignment for one of his clients. After preliminary information, gathering and vulnerability scanning Richard runs the SQLMAP tool to extract the database information. Richard is working on a web app pen testing assignment for one of his clients. After preliminary information, gathering and vulnerability scanning Richard runs the SQLMAP tool to extract the database information.](https://examcert.org/wp-content/uploads/2021/07/ECSAv10-Part-01-Q14-001.jpg)
Richard is working on a web app pen testing assignment for one of his clients. After preliminary information, gathering and vulnerability scanning Richard runs the SQLMAP tool to extract the database information.
![Amazon.com: Kali Linux Network Scanning Cookbook - Second Edition: A StepbyStep Guide leveraging Custom Scripts and Integrated Tools in Kali Linux eBook : Hixon, Michael, Hutchens, Justin: Kindle Store Amazon.com: Kali Linux Network Scanning Cookbook - Second Edition: A StepbyStep Guide leveraging Custom Scripts and Integrated Tools in Kali Linux eBook : Hixon, Michael, Hutchens, Justin: Kindle Store](https://images-na.ssl-images-amazon.com/images/I/81hC+35nEQL.jpg)