Configuring a Burp Intruder attack
The main Intruder UI lets you configure multiple attacks simultaneously, each in its own tab. When you send requests to Intruder, each one is opened in its own numbered tab. Each attack configuration tab contains several sub-tabs that are used to configure the attack. Use the links below for help on the details of each tab:
- Target - This is used to configure the details of the target server for the attack.
- Positions - This is used to configure the request template for the attack, together with payload positions, and the attack type (this determines the way in which payloads are assigned to payload positions).
- Payloads - This is used to configure one or more sets of payloads, which will be placed into payload positions during the attack.
- Options - This is used to configure numerous other options affecting the attack.
The easiest way to create a new Intruder attack is to select the relevant base request within another Burp tool (such as the Proxy history or Target site map), and use the "Send to Intruder" option on the context menu.
This will create a new attack tab, and automatically populate the Target and Positions tabs with the relevant details about the base request. You can then modify the automatic payload positions if required, and configure suitable payloads and other attack options.
You can see that Burp has automatically made a guess at where you would like to position payloads. By default, payloads are placed into the values of all request parameters and cookies. Each pair of payload markers defines a single payload position, and may enclose some text from the base request, which will be replaced with the contents of the payload when that payload position is used. For further details, see the payload positions help.
The buttons next to the request editor can be used to "add" and "clear" the payload markers. Try adding payload markers in new locations within the request, and removing other markers, and see the effects. When you have understood how the payload markers work, click the "Auto §" button to revert to the default payload positions that Burp configured for you.
Next, go to the "Payloads" tab. This lets you define the payloads that will be placed into the defined payload positions. Keep the default setting (to use a "Simple list" of payloads), and add some test strings to the list. You can enter your own strings by typing into the "Enter a new item" box and clicking "Add". Or you can use the "Add from list" drop-down and choose "Fuzzing - quick" from the list of built-in payload strings [Pro version].
Burp Intruder has a number of functions to help you manage attack configurations. These functions are available via the Intruder menu.
You can save the attack configuration for the current tab, and reload it later. When loading or saving, you can optionally include or exclude the payload positions settings.
Including the payload positions settings lets you save the full configuration for a specific attack. Excluding the payload positions settings lets you save a generic attack configuration that can be reused for another base request template and payload positions - for example, your preferred configuration for fuzzing a particular type of request.
You can copy attack configurations between two existing tabs, or into a new tab. Again, you can optionally include or exclude the "payload positions" settings.
You can control how Intruder handles attack configurations when you open a new attack tab. You can choose to use the default attack configuration, or to copy the configuration from the first or last open tab.
Using the latter options lets you create a generic attack configuration (e.g. for fuzzing), and automatically apply this to each new request that you send to Intruder.
The attack tabs themselves are easy to manage. You can:
- Rename tabs by double-clicking the tab header.
- Reorder tabs by dragging them.
- Open a new tab by clicking on the right-most "..." tab.
- Close tabs by clicking the X button in the tab header.
Launching an attack
When your attack is fully configured, you can launch the attack by selecting "Start attack" from the Intruder menu, or by clicking the "Start attack".
Each attack runs in a new window, containing detailed results, with full requests and responses (if configured). There are various functions to help you analyze the results, and identify interesting items for further investigation.