WMAP — Web Vulnerability Scanning in Metasploit
Alright, time for some web hacking nostalgia with WMAP, the OG web vulnerability scanner baked into Metasploit. Before fancy tools like Burp or Nessus got all the hype, WMAP was lurking in MSF, ready to map and poke your web apps for holes.
WTF is WMAP?
WMAP is Metasploit’s built-in web application assessment tool. It:
- Crawls web applications
- Scans for common web vulnerabilities
- Integrates results directly into your Metasploit database
- Helps you pivot straight into exploiting stuff you discover
Think of it as a primitive web scanner — not as feature-rich as Burp Suite, but useful if you’re already rolling in MSF.
How to Use WMAP — Full Pipeline
Here’s how to run WMAP from start to finish, with all the MSF commands you’d want for a Windows or Linux target.
1. Fire Up Metasploit
If you haven’t already:
msfconsole
2. Load WMAP
In the console, load the WMAP plugin:
load wmap
If it loads successfully, you’ll see:
[*] Successfully loaded plugin: wmap
3. Configure Database (Optional but Recommended)
WMAP works best if you’re logging data into MSF’s database.
Initialize it:
db_status
If it says “connected,” you’re good. Otherwise, create a workspace:
workspace -a mywebscan
4. Add Your Target
Add your target web server URL to WMAP:
wmap_targets -a http://10.10.10.20
Or HTTPS:
wmap_targets -a https://10.10.10.20
List targets to confirm:
wmap_targets -l
5. Launch a Site Mapping Scan
Before scanning for vulns, WMAP can crawl the target to gather paths and pages.
Run a site map:
wmap_run -t
This grabs URLs, parameters, etc.
6. Launch a Vulnerability Scan
Now let’s actually look for vulnerabilities.
Run vulnerability scans with:
wmap_run -e
Or combine mapping and scanning in one shot:
wmap_run -ae
-a
= run all modules-e
= execute exploits/modules-t
= run site mapping only
7. Check the Results
After scans, check collected loot in your MSF database. For example:
hosts
services
vulns
Vulnerabilities discovered are stored and can be used to plan further attacks.
Example WMAP Workflow
Here’s a full example:
msfconsole
load wmap
workspace -a webtest
wmap_targets -a http://10.10.10.20
wmap_targets -l
wmap_run -t
wmap_run -e
vulns
If you spot something tasty (e.g. SQLi, XSS), pivot into Metasploit modules for exploiting it.
Caveats
- WMAP is old and a bit dusty. It’s nowhere near as comprehensive as Burp, Nessus, or modern scanners.
- Results can be noisy — false positives happen.
- Limited support for complex modern apps (e.g. heavy JavaScript).
Why Bother?
- If you’re already working in MSF, it’s fast to kick off some basic scans.
- Vulnerability data stays in your Metasploit workspace for easy follow-up exploitation.
Side note: WMAP won’t replace Burp Suite, but it’s a cool trick to keep in your hacker toolbox. And sometimes it catches low-hanging fruit the fancy tools miss.