1. Support Center
  2. Documentation
  3. Desktop editions
  4. Tools
  5. Intruder
  6. Configure attack

Configuring a Burp Intruder attack

The main Intruder UI lets you configure multiple attacks simultaneously, each in its own tab. When you send requests to Intruder, each one is opened in its own numbered tab. Each attack configuration tab contains several sub-tabs that are used to configure the attack. Use the links below for help on the details of each tab:

The easiest way to create a new Intruder attack is to select the relevant base request within another Burp tool (such as the Proxy history or Target site map), and use the "Send to Intruder" option on the context menu.

Send to Intruder

This will create a new attack tab, and automatically populate the Target and Positions tabs with the relevant details about the base request. You can then modify the automatic payload positions if required, and configure suitable payloads and other attack options.

You can see that Burp has automatically made a guess at where you would like to position payloads. By default, payloads are placed into the values of all request parameters and cookies. Each pair of payload markers defines a single payload position, and may enclose some text from the base request, which will be replaced with the contents of the payload when that payload position is used. For further details, see the payload positions help.

Add payload positions

The buttons next to the request editor can be used to "add" and "clear" the payload markers. Try adding payload markers in new locations within the request, and removing other markers, and see the effects. When you have understood how the payload markers work, click the "Auto ยง" button to revert to the default payload positions that Burp configured for you.

Intruder buttons

Next, go to the "Payloads" tab. This lets you define the payloads that will be placed into the defined payload positions. Keep the default setting (to use a "Simple list" of payloads), and add some test strings to the list. You can enter your own strings by typing into the "Enter a new item" box and clicking "Add". Or you can use the "Add from list" drop-down and choose "Fuzzing - quick" from the list of built-in payload strings [Pro version].

Payload options

Burp Intruder has a number of functions to help you manage attack configurations. These functions are available via the Intruder menu.

Intruder menu

You can save the attack configuration for the current tab, and reload it later. When loading or saving, you can optionally include or exclude the payload positions settings.

Including the payload positions settings lets you save the full configuration for a specific attack. Excluding the payload positions settings lets you save a generic attack configuration that can be reused for another base request template and payload positions - for example, your preferred configuration for fuzzing a particular type of request.

Save attack configuration

You can copy attack configurations between two existing tabs, or into a new tab. Again, you can optionally include or exclude the "payload positions" settings.

Copy attack configuration

You can control how Intruder handles attack configurations when you open a new attack tab. You can choose to use the default attack configuration, or to copy the configuration from the first or last open tab.

Using the latter options lets you create a generic attack configuration (e.g. for fuzzing), and automatically apply this to each new request that you send to Intruder.

New tab behavior

The attack tabs themselves are easy to manage. You can:

Launching an attack

When your attack is fully configured, you can launch the attack by selecting "Start attack" from the Intruder menu, or by clicking the "Start attack".

Each attack runs in a new window, containing detailed results, with full requests and responses (if configured). There are various functions to help you analyze the results, and identify interesting items for further investigation.