ProfessionalCommunity Edition

Analyzing attack results

  • Last updated: December 19, 2024

  • Read time: 1 Minute

You can use the following functions to analyze results and identify interesting requests:

  • Copy column contents - Control-click the header to extract a column for further analysis.
  • Customize the table - Customize and sort the table contents. For more information, see Customizing Burp's tables.
  • Filter the table - Use the capture filter and the view filter to manage which attack results are captured and displayed. For more information, see Filtering attack results.
  • Add a note - Double-click in the Comment column and enter your comment in the cell.
  • Highlight a result - Right-click the item and select Highlight, then choose a color from the list.

Related pages

  • To learn how to control the attack and adjust the attack configuration while the attack is running, see Editing attacks.
  • To learn how to perform further actions on any results item to drive your testing workflow, see Burp Intruder workflow tools.

Was this article helpful?