You can use Burp Intruder to insert a list of possible usernames into an authentication mechanism, such as a login form or registration form. This enables you to identify valid usernames that can be used in other attacks. For example, using a list of enumerated usernames greatly reduces the time and effort required to force a login in a password-guessing attack. It can also be used for attacks on user data or sessions.
You can follow along with the process below using our Username enumeration via subtly different responses lab. If you're using the lab, make sure you use the list of usernames included in the lab instructions.
You can use Burp Intruder to enumerate usernames:
Go to Intruder. Notice that the username value has been automatically added as a payload position.
In the Payloads side panel, under Payload configuration, add a list of usernames that you want to test.
Add an extract grep for sections of interest in the response.
When the attack is finished, study the responses to look for any behavior that may indicate a valid username. For example, look for any anomalous error messages, response times, or status codes. In the example below, one error message is missing a full stop.
Go to the Comparer tab. Select the two responses and click Words or Bytes to compare the responses. Any differences are highlighted.