Although it's far more efficient to first enumerate a valid username and then attempt to guess the matching password, this may not always be possible. Using Burp Intruder, you can attempt to brute-force both usernames and passwords in a single attack.
The example below is simplified to demonstrate how to use the relevant features of Burp Suite. To run this kind of attack on real websites, you usually need to also bypass defenses such as rate limiting. For some ideas on how to do this, see the Authentication topic on the Web Security Academy.
Obtain lists of potential usernames and passwords. For the example below, you can use the following lists:
In practice, we recommend sorting the list in order of how likely you think the username or password is to be correct.
You can follow along with the process below using the Username enumeration via subtly different responses lab from our Web Security Academy.
In the request, highlight the username value and click Add ยง to mark it as a payload position. Do the same for the password.
1 from the Payload position drop-down list.
Under Payload configuration, paste the list of usernames.
2 from the Payload position drop-down list, and paste the list of passwords.
When the attack is finished, study the responses to look for any behavior that may indicate a valid login. For example, look for any anomalous error messages, response times, or status codes. In the example below, one of the requests has received a 302 response.