This tab is used to configure one or more payload sets. The number of payload
sets depends on the attack type defined in the
Positions tab. For many common
tasks, such as fuzzing parameters, brute force guessing a user's password, or
cycling through page identifiers, only a single payload set is needed.
The configuration steps needed to configure a payload set are as follows:
- Select the payload set that you wish to configure from the drop-down
- Select the payload type to use from the drop-down
list. A large number of payload types are available, and these are
highly configurable, allowing you to quickly automate the generation of
payloads for virtually any situation:
- Configure the payload options
for the selected payload type.
- Configure any required
payload processing rules, to manipulate the
generated payloads in various ways.
- Configure the required payload
encoding, to ensure that the correct characters are
URL-encoded for safe transmission over HTTP.
Monday, January 16, 2017
This release adds various enhancements and fixes:
- There is a new command-line option to launch Burp with a specified user configuration file.
- A bug that was recently introduced that prevented license activation in headless mode has been fixed.
- The Content Discovery function now correctly handles applications that have wildcard behavior for file extensions (e.g. those that return a specific response for admin.xxx regardless of the file extension). This eliminates the only known false positives reported by the new Content Discovery engine.
See all release notes ›