login

Burp Suite, the leading toolkit for web application security testing

Attack Target

This tab is used to configure the details of the target server for the attack. The required options are:

The easiest way to configure these details is to select the request you want to attack anywhere within Burp, and choose the "Send to Intruder" option on the context menu. This will send the selected request to a new tab in Intruder, and will automatically populate the Target and Positions tabs. 

Support Center

Get help and join the community discussions at the Burp Suite Support Center.

Visit the Support Center ›

Monday, August 22, 2016

1.7.05

This release introduces native platform installers for Windows, Linux and OS X. These install Burp together with a private Java runtime environment, so you don't need to worry about installing or updating Java. The installation of Burp is fully integrated with standard OS features (start menu, dock, taskbar etc.), making it easier to launch Burp without use of the command line.

See all release notes ›

Copyright © 2016 PortSwigger Ltd. All rights reserved.