Web applications often use identifiers to refer to items of data or resources, such as:
You can use Burp Intruder to enumerate valid or interesting identifiers from a large number of potential items.
Find a request that contains an identifier in a parameter, and that has a response with interesting data about the identifier.
Configure a single payload position at the parameter's value.
Use a suitable payload type to generate potential identifiers to test, using the correct format or scheme. Start the attack.
Sort the attack results based on various attributes to identify any anomalous results. This will allow you to infer valid identifiers. For example, a valid identifier may return a different HTTP status code.
If a valid identifier returns a response containing a specific expression, you can define a match grep item to identify responses that contain this expression. For example, you could search for phrases such as "password incorrect" or "login successful" to locate successful logins. For more information, see Burp Intruder attack settings.
You can configure your attack to enumerate a huge variety of identifiers, for example: