In this chapter, we learned about WMAP, its architecture, and the scanning process. Next, we learned how to import output from different tools such as Burp Suite into Metasploit and moved onto loading, configuring, and performing a scan using the WMAP module. At the end of the chapter, we looked at how we can use clustered scanning in WMAP.
In the next chapter, we will look at pen testing for WordPress.