Burp Intruder includes a range of built-in payload lists. You can use these to quickly and easily generate payloads for various attacks.
You can use a predefined payload list with any payload type that uses a list of strings:
You can load your own directory of custom payload lists. Do this in Burp's Settings dialog. To open the dialog, click on Settings in the top toolbar. For more information, see Intruder settings.
Some of the predefined payload lists include placeholders that you can replace with your own values:
|
Predefined payload list |
Placeholders used in the list |
|
CGI Scripts |
|
|
Fuzzing - full |
|
|
Fuzzing - JSON_XML injection |
|
|
Fuzzing - out of band |
|
|
Fuzzing - path traversal (single file) |
|
|
Fuzzing - path traversal |
|
|
Fuzzing - quick |
|
Before you run an attack with one of the payload lists above, you need to replace placeholders with actual values. The table below details how each of the placeholders can be used:
|
Placeholder |
Use |
Example placeholder replacement |
|
|
Specify a filename. |
|
|
|
Replaces |
|
|
|
Specify a web domain. |
|
|
|
Specify a web domain as part of an email address. |
|
To add a placeholder to your attack, set up a processing rule:
\{file\} or \{domain\}.
application.exe instead of \{file\}, or portswigger.net instead of \{domain\}.