login

Burp Suite, the leading toolkit for web application security testing

Attack Target

This tab is used to configure the details of the target server for the attack. The required options are:

The easiest way to configure these details is to select the request you want to attack anywhere within Burp, and choose the "Send to Intruder" option on the context menu. This will send the selected request to a new tab in Intruder, and will automatically populate the Target and Positions tabs. 

Support Center

Get help and join the community discussions at the Burp Suite Support Center.

Visit the Support Center ›

Tuesday, March 31, 2015

v1.6.13

This release contains various bugfixes and minor enhancements, including:

  • Some bugs in the Target site map, which caused scope-based view filters to be sometimes misapplied, and orphaned tree nodes to occasionally appear, have now been fixed.
  • Burp now detects startup deadlocks caused by extensions, and doesn't reload them on the subsequent startup.
  • Burp now detects failure to delete temporary files on shutdown, and automatically deletes them on the next startup, without prompting the user.

See all release notes ›

Copyright © 2015 PortSwigger Ltd. All rights reserved.