Reflected input is when data is copied from a request and echoed into the application's immediate response. This is a prerequisite for a range of vulnerabilities, including reflected cross-site scripting (XSS). You can use Burp to test for reflected input:
You can follow the processes below using the lab Reflected XSS into HTML context with nothing encoded.
If you're using Burp Suite Professional, you can use Burp Scanner to test for reflected input:
Review the Issues tab on the Dashboard to identify any reflected input that Burp Scanner flags.
xsstest.
Review the response. Use the text editor search function to identify whether the unique string is reflected in the response.
Once you have identified reflected input, you can investigate the request further to test for vulnerabilities, such as: