ProfessionalCommunity Edition
Analyzing attack results
-
Last updated: December 19, 2024
-
Read time: 1 Minute
You can use the following functions to analyze results and identify interesting requests:
- Copy column contents - Control-click the header to extract a column for further analysis.
- Customize the table - Customize and sort the table contents. For more information, see Customizing Burp's tables.
- Filter the table - Use the capture filter and the view filter to manage which attack results are captured and displayed. For more information, see Filtering attack results.
- Add a note - Double-click in the Comment column and enter your comment in the cell.
- Highlight a result - Right-click the item and select Highlight, then choose a color from the list.
Related pages
- To learn how to control the attack and adjust the attack configuration while the attack is running, see Editing attacks.
- To learn how to perform further actions on any results item to drive your testing workflow, see Burp Intruder workflow tools.