You can use the following functions to analyze results and identify interesting requests:
Copy column contents - Control-click the header to extract a column for further analysis.
Customize the table - Customize and sort the table contents. For more information, see Customizing Burp's tables.
Filter the table - Use the capture filter and the view filter to manage which attack results are captured and displayed. For more information, see Filtering attack results.
Add a note - Double-click in the Comment column and enter your comment in the cell.
Highlight a result - Right-click the item and select Highlight, then choose a color from the list.
Related pages
To learn how to control the attack and adjust the attack configuration while the attack is running, see Editing attacks.
To learn how to perform further actions on any results item to drive your testing workflow, see Burp Intruder workflow tools.