Burp Intruder attack settings

You can configure Burp Intruder attack settings before you launch an attack in the Settings side panel. You can open or close the side panel by clicking the Settings tab. You can also modify many of the settings while the attack is running. Edit these in the cloned Settings side panel in the results window.

Note

To configure Burp Intruder user settings for startup and closing behavior, and to upload payload lists, go to the Intruder page in the Settings dialog. To open the dialog, click Settings in the top toolbar. For more information, see Intruder settings.

Save attack

By default, attacks are saved in-memory, so they are lost if you close Burp Suite. However, you can save them to your project file. Select Save attack to project file.

We recommend that you only save attacks when you find something interesting. If you save too many attacks to project files it can result in large files.

Request headers

These settings control whether Intruder updates the configured request headers during attacks:

Error handling

These settings control how Intruder handles network errors during an attack:

Attack results

These settings control what information is captured in the attack results:

Auto-pause attack

These settings automatically pause the attack when a specified expression appears in or is missing from a response.

To auto-pause the attack:

  1. Select Enable auto-pause.

  2. Choose one of the following options:

  3. Add expressions to the list that you want to check for in responses.

  4. Select the Match type for your expressions:

  5. If required, enable Case-sensitive match to match uppercase and lowercase exactly as typed.

During the attack, Burp automatically pauses the attack if a response contains (or doesn't contain) the expressions. You can resume the attack at any time by clicking . Once resumed, Burp will pause the attack each time a response meets the auto-pause condition.

Grep - match

These settings flag result items that contain specified expressions in the response.

During the attack, Burp adds a results column for each expression in the list. This records the number of times the expression is found in the response. To identify results with the expression, click on the column header to sort the results.

Intruder grep match

Related pages

You can use the Grep - match settings to quickly identify interesting items from large sets of results. For more information, and some common use cases, see:

Grep - extract

These settings extract information from responses.

To specify an interesting string for information extraction, select Extract the following items from responses, and click Add. A new window opens in which you can define the location of the item to be extracted.

Confirming the selection

Note

To extract information from multiple occurrences of an item, add the item multiple times in succession. This is useful, for example, when an HTML table contains useful information but there are no unique prefixes with which to automatically pick out each item.

To configure a maximum length that Burp captures for each item, enter a value in the Maximum capture length field.

During the attack, Burp adds a results column for the extracted information. Click the column header to sort the results.

Extract grep results

Related pages

Grep - payloads

These settings can be used to flag result items containing reflections of the submitted payload:

During the attack, Burp adds a results column that records the number of times the payload is found in the response. If more than one payload set is used, a separate column is added for each payload set.

You can use the Grep - payloads settings to detect cross-site scripting and other response injection vulnerabilities, which can arise when user input is dynamically inserted into the application's response.

Redirections

These settings control how Burp handles redirections when performing attacks. It is often necessary to follow redirections to achieve the objectives of your attack. For example:

Note

Automatically following redirections may sometimes cause problems for your attack. For example, if the application responds to a malicious request with a redirection to the logout page, then your session may be terminated.

The following settings are available:

Burp follows up to 10 chained redirections. A column in the results table indicates whether a redirect was followed for each individual result. The full requests and responses in the redirection chain are stored with each result item.

You can configure the types of redirection that Burp processes in the suite-wide redirection settings. These are found under Proxy in the Settings dialog. Click on Settings to open the dialog. For more information, see HTTP Settings.

Note

It may be necessary to use only a single-threaded attack when following redirections. For example, when the application stores the result of the initial request within your session, and retrieves this when delivering the redirection response.

HTTP/1 connection reuse

Use this setting to control whether Burp Intruder reuses connections to issue multiple HTTP/1 requests. This can greatly increase the speed of your attacks.

If you deselect HTTP/1 connection reuse, Burp opens a new connection for each request and closes it after receiving a response.

HTTP version

Use this setting to control whether Burp Intruder uses HTTP/2 or HTTP/1 for the current attack.

If you enable Override the project-level HTTP/2 setting, then Burp ignores the current project-level HTTP/2 setting configuration.

You can then choose whether to use HTTP/2 or HTTP/1 for the current attack. Select Default to HTTP/2 if the server supports it to use HTTP/2 with all servers that advertise support for it during the TLS handshake. Deselect this option to use HTTP/1 even if the server supports HTTP/2.

Note

HTTP settings - HTTP/2 - Gives more information about the project-level HTTP/2 setting.