PHP Template Injection
A super user of the target Joomla instance has been compromised.
Checking the template reveals that the protostar template is being used as default
It can be edited directly since the current user is a super user
Appending the generated PHP reverse shell payload into the bottom of the index.php file of the protostaar templates.
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/glasgowsmile]
└─$ curl -s http://$IP/joomla/Invoking the payload
Initial Foothold established to the glasgowsmile host as the www-data account via injecting a malicious PHP code into an existing template.