You can use Burp Intruder to extract interesting data from an attack. This information enables you to focus on the most critical items, and can feed into future attacks.
Find a request that contains an identifier in a parameter, and that has a response with interesting data about the identifier.
Configure a single payload position at the parameter's value.
Use a suitable payload type to generate potential identifiers to test, using the correct format or scheme.
Configure the Grep - extract settings to retrieve relevant data from each response. For more information on these settings, see Burp Intruder attack settings.
Sort the attack results by the extract grep expressions to identify any interesting information that has been extracted.
To copy and paste the data for further analysis, control-click the header.
You can configure your attack to harvest a wide range of useful data, for example: