Introduction
Web applications based on the LAMP stack of Linux, Apache, MySQL, and PHP are important and a common target of attackers. Some web applications like phpMyAdmin are primarily administrative; phpMyAdmin is used to remotely manage MySQL installations. Applications like Joomla! and WordPress are content management systems that are used as the back end for many web sites; more than a quarter of web sites use WordPress or Joomla!.
Web applications can be attacked through several vectors; one approach is a brute force attack on the site’s authentication mechanism. There are Metasploit modules that ...