login

Burp Suite, the leading toolkit for web application security testing

Target Analyzer

This function can be used to analyze a target web application and tell you how many static and dynamic URLs it contains, and how many parameters each URL takes. This can help you assess how much effort a penetration testing engagement is likely to involve, and can help you decide where to focus your attention during the test itself.

To access this feature, select one or more hosts or branches within the site map, and choose "Analyze site map" within "Engagement tools" in the context menu.

The Target Analyzer dialog contains the following tabs:

The following points are worth noting about the target analyzer:

Support Center

Get help and join the community discussions at the Burp Suite Support Center.

Visit the Support Center ›

Wednesday, January 27, 2016

1.6.36

This release adds a new scan check for client-side template injection.

It is very common for applications that use AngularJS to incorporate user input into HTML responses within the client-side template. AngularJS has a long history of sandbox escapes that permit execution of arbitrary JavaScript via template expressions. Hence, when user input is echoed within AngularJS templates, it is frequently possible to perform XSS attacks using minimal syntax that is not usually sufficient to perform XSS, and so not blocked by input filters.

See all release notes ›

Copyright © 2016 PortSwigger Ltd. All rights reserved.