Burp Suite Enterprise Edition is now available in our secure Cloud  –  Learn more

ProfessionalCommunity Edition

Evaluating inputs with Burp Suite

  • Last updated: June 18, 2024

  • Read time: 3 Minutes

Once you have discovered functionality that is worth investigating further, you can use a range of Burp's tools to evaluate the user controllable inputs. This enables you to determine which inputs are most important to the application's function. For example, these may be inputs that impact the session or state of the application.

To evaluate inputs with Burp Suite, you can:

  • Manually evaluate individual inputs.
  • Scan the inputs.
  • Fuzz the inputs.

Before you start

We recommend that you complete the following steps before starting this tutorial:


You can follow along with the process below using a lab with a SQL injection vulnerability. For example, SQL injection in WHERE clause allowing retrieval of hidden data.

Manually evaluating individual inputs

You can manually evaluate how individual inputs impact the application:

  1. Send a request to Burp Repeater.
  2. Go to the Repeater tab and modify each input in turn. For example, you can:

    1. Remove the input.
    2. Give the input an empty value.
    3. Insert a Collaborator payload in the input. Highlight the input, then right-click and select Insert Collaborator payload.
  3. Click Send to send the request.
  4. Review the responses for noteworthy behavior, such as input reflections or differences in response times.
  5. To identify subtle changes between responses, send the responses to Burp Comparer. In Burp Comparer:

    1. Select the two responses to compare.
    2. Click Words or Bytes to compare the responses. A new window opens with the results. Comparer highlights any differences between the responses.

Scanning inputs

If you're using Burp Suite Professional, you can scan inputs to identify potential vulnerabilities, which Burp Scanner flags as issues.

To scan a single input:

  1. Highlight the input. You can do this from any message editor in Burp, for example from Proxy > HTTP history.
  2. Right-click and select Scan selected insertion point. The scan launcher opens.
  3. Click OK to start the scan using the default configuration.

To scan multiple inputs at the same time:

  1. Send the request to Burp Intruder.
  2. Go to Intruder > Positions.
  3. Add a payload position for each input you want to scan:

    1. Select the input.
    2. Click Add ยง.

  4. Right-click the request and select Scan defined insertion points. The scan launcher opens.
  5. Click OK to start the scan using the default configuration.

Burp Scanner audits the request using only the selected inputs. To view the issues identified by the scan:

  1. Go to the Dashboard tab.
  2. From the Tasks list, select the relevant scan task.
  3. Go to the Issues tab. This contains a record of the issues found in the scan.

Fuzzing inputs

You can fuzz an input to identify potential vulnerabilities:

  1. Highlight the input in the request, then right-click and select Send to Intruder.
  2. Go to the Intruder > Positions tab. Notice that the input is automatically marked as a payload position.

    Set payload position for evaluating inputs
  3. Go to the Intruder > Payloads tab. Under Payload settings, add a list of fuzz strings. If you're using Burp Suite Professional, open the Add from list dropdown menu and select the built-in Fuzzing - full list. Otherwise, add your own list.
  4. Click Start attack. The attack starts in a new dialog. Burp Intruder sends a request for each fuzz payload.
  5. When the attack is finished, study the responses to look for any noteworthy behavior.

Was this article helpful?