This tab is used to configure one or more payload sets. The number of payload
sets depends on the attack type defined in the
Positions tab. For many common
tasks, such as fuzzing parameters, brute force guessing a user's password, or
cycling through page identifiers, only a single payload set is needed.
The configuration steps needed to configure a payload set are as follows:
- Select the payload set that you wish to configure from the drop-down
- Select the payload type to use from the drop-down
list. A large number of payload types are available, and these are
highly configurable, allowing you to quickly automate the generation of
payloads for virtually any situation:
- Configure the payload options
for the selected payload type.
- Configure any required
payload processing rules, to manipulate the
generated payloads in various ways.
- Configure the required payload
encoding, to ensure that the correct characters are
URL-encoded for safe transmission over HTTP.
Wednesday, April 22, 2015
This release contains a number of minor enhancements and bugfixes, including:
- The Proxy now uses SHA256 to generate its CA and per-host certificates
- There is a new button at Proxy / Options / Proxy Listeners to force Burp to regenerate its CA certificate.
- A bug in the "Paste from file" function which caused Burp to sometimes retain a lock on the selected file has been fixed.
- A bug in the Intruder "extract grep" function, which sometimes caused extracted HTML content to be rendered as HTML in the results table, has been fixed.
See all release notes ›