login

Burp Suite, the leading toolkit for web application security testing

Payload Processing

The payloads generated by the configured payload type can be further manipulated using various payload processing rules and payload encoding.

Payload Processing Rules

You can define rules to perform various processing tasks on each payload before it is used. The defined rules are executed in sequence, and can be toggled on and off to help debug any problems with the configuration. Payload processing rules are useful in many kinds of situation where you need to generate unusual payloads, or need to wrap payloads up within a wider structure or encoding scheme prior to use.

The following types of rule are available:

Payload Encoding

You can configure which characters within the payload should be URL-encoded for safe transmission within HTTP requests. Any configured URL-encoding is applied last, after any payload processing rules have executed.

It is recommended to use this setting for final URL-encoding, rather than a payload processing rule, because the payload grep option can be used to check responses for echoed payloads before the final URL-encoding is applied.

Support Center

Get help and join the community discussions at the Burp Suite Support Center.

Visit the Support Center ›

Tuesday, July 7, 2015

1.6.21

In this release, the description and remediation text for all Scanner issues has been rewritten to bring things up to date. Additionally, the definitions for all available issues can now be viewed within the Burp UI.

This should hopefully provide a useful learning resource for people setting out in web security testing who want to read up about different vulnerabilities. It will also help people who create integrations between Burp and other security tools.

See all release notes ›

Copyright © 2015 PortSwigger Ltd. All rights reserved.