Scanning specific HTTP messages makes it easy to run focused scans on a particular set of requests or responses.
You can scan HTTP messages from most places that display HTTP traffic in Burp Suite. In tools that display lists of HTTP requests (such as the Site map and HTTP history tabs) you can select multiple entries to scan.
To scan the selected HTTP messages, right-click and select one of the scan options from the context menu. There are three options available:
Scan. This menu item has two options:
Do passive scan. Burp Scanner analyzes the contents of the base request and response, rather than sending its own requests.
Do active scan. Burp Scanner sends its own requests to the target to probe for vulnerabilities.
To configure an audit of specific HTTP messages:
Right-click the messages required and select Scan.
From the Scan type tab of the scan launcher, select Audit selected items.
Select the task that you want the audit to run under:
Optionally, select Consolidate items to remove unnecessary messages from the audit. You can consolidate items using the following criteria:
Optionally, specify details for the remaining launcher tabs:
Click Scan to start the audit.
Alternatively, you can configure a crawl or a combined crawl and audit of the selected HTTP messages. To do this, select the appropriate option in the Scan type tab of the scan launcher. Burp automatically fills the Scan details > URLs to scan field based on the selected URLs. For more information on how this restricts the scope of the crawl, see Setting the scan scope.
You can configure the remaining scan settings as you would for a crawl and audit. For more information, see Running a full crawl and audit.