[Pro version] The functions to save and restore state can be accessed from the Burp menu.
The items that can be saved are as follows:
Selecting "Save state" from the Burp menu launches a wizard where you can choose which items you want to save the state and configuration of, and select the output file. The following options are also available:
You can continue using Burp while its state is being saved, although you may experience some brief delays if you try to perform an operation on data that Burp is in the process of saving, to prevent any data corruption.
Selecting "Restore state" from the Burp menu launches a wizard where you can choose which items you want to restore the state and configuration of. The first step is to select a state file that you previously saved. Burp then analyses the file to determine its contents (i.e., the tools whose state and configuration it contains). You can then choose which tools' state and configuration you want to restore, and whether to add to or replace each tool's existing state.
You can optionally tell Burp to pause the Spider and Scanner tools following the restore. This option is on by default and is usually desirable when restoring an old state file, to avoid inadvertently attacking any targets which are in-scope for that state file and which have actions pending in the Spider or Scanner queues.
You can continue using Burp while its state is being restored, although you may experience some brief delays if you try to perform an operation on data that Burp is in the process of restoring, to prevent any data corruption.
The ability to save and restore tool state and configuration is of huge benefit to penetration testers:
Get help and join the community discussions at the Burp Suite Support Center.
This release introduces Burp Collaborator. This major new feature has the potential to revolutionize web security testing. In the coming months, we will be adding many exciting new capabilities to Burp, based on the Collaborator technology, enabling Burp to discover many new types of security vulnerabilities.