Configuring Burp Intruder attacks
Last updated: October 20, 2023
Read time: 1 Minute
When you send an HTTP request to Burp Intruder, it opens in a new attack tab. Burp Intruder enables you to insert payloads into defined positions in an HTTP request, then send each version of the request to the target server. You can configure various aspects of the attack:
- Payload positions - The locations in the base request where payloads are placed.
- Attack type - The algorithm for placing payloads into your defined payload positions.
- Payload type - The type of payload that you want to inject into the base request. You can use a simple wordlist, but Burp Suite also provides a range of options for auto-generating payloads. Burp Suite Professional includes a range of predefined payload lists for use with compatible payload types.
- Payload processing - Rules to manipulate each payload before it is used.
- Resource pool - The allocation of resources to the attack.
- Attack settings - Burp Intruder attack settings.
You can use the top-level Intruder menu to save the attack configuration, or load it in a future attack. Alternatively you can copy the attack configuration into any open tab. For each function you can choose whether to include the payload positions.
Once you have configured the attack, click Start attack to send the request to the target server.
- For more information on using attack tabs, see Managing attack tabs.
Was this article helpful?
An error occurred, please try again.