You can configure Burp Intruder attack settings before you launch an attack in the Settings side panel. You can open or close the side panel by clicking the Settings tab. You can also modify many of the settings while the attack is running. Edit these in the cloned Settings side panel in the results window.
To configure Burp Intruder user settings for startup and closing behavior, and to upload payload lists, go to the Intruder page in the Settings dialog. To open the dialog, click Settings in the top toolbar. For more information, see Intruder settings.
By default, attacks are saved in-memory, so they are lost if you close Burp Suite. However, you can save them to your project file. Select Save attack to project file.
We recommend that you only save attacks when you find something interesting. If you save too many attacks to project files it can result in large files.
These settings control whether Intruder updates the configured request headers during attacks:
Content-Length header in each request with the correct length of the request's HTTP body. This is useful for attacks that insert variable-length payloads into the body of the template HTTP request. If the correct length is not specified, then the target server may return an error, respond to an incomplete request, or wait indefinitely for further data to be received in the request.
Connection header with the value close. This may mean attacks are performed more quickly when the server does not itself return a valid Content-Length or Transfer-Encoding header.
These settings control how Intruder handles network errors during an attack:
These settings control what information is captured in the attack results:
Store requests / responses - Specify whether the attack saves the contents of individual requests and responses. This consumes disk space in your temporary directory, but enables you to:
These settings automatically pause the attack when a specified expression appears in or is missing from a response.
To auto-pause the attack:
Select Enable auto-pause.
Choose one of the following options:
Pause if an expression in the list appears in a response.
Pause if an expression in the list is missing from a response.
Add expressions to the list that you want to check for in responses.
Select the Match type for your expressions:
Simple string - Match the exact string.
Regex - Match a regular expression.
If required, enable Case-sensitive match to match uppercase and lowercase exactly as typed.
During the attack, Burp automatically pauses the attack if a response contains (or doesn't contain) the expressions. You can resume the attack at any time by clicking . Once resumed, Burp will pause the attack each time a response meets the auto-pause condition.
These settings flag result items that contain specified expressions in the response.
During the attack, Burp adds a results column for each expression in the list. This records the number of times the expression is found in the response. To identify results with the expression, click on the column header to sort the results.
You can use the Grep - match settings to quickly identify interesting items from large sets of results. For more information, and some common use cases, see:
These settings extract information from responses.
To specify an interesting string for information extraction, select Extract the following items from responses, and click Add. A new window opens in which you can define the location of the item to be extracted.
To extract information from multiple occurrences of an item, add the item multiple times in succession. This is useful, for example, when an HTML table contains useful information but there are no unique prefixes with which to automatically pick out each item.
To configure a maximum length that Burp captures for each item, enter a value in the Maximum capture length field.
During the attack, Burp adds a results column for the extracted information. Click the column header to sort the results.
These settings can be used to flag result items containing reflections of the submitted payload:
During the attack, Burp adds a results column that records the number of times the payload is found in the response. If more than one payload set is used, a separate column is added for each payload set.
You can use the Grep - payloads settings to detect cross-site scripting and other response injection vulnerabilities, which can arise when user input is dynamically inserted into the application's response.
These settings control how Burp handles redirections when performing attacks. It is often necessary to follow redirections to achieve the objectives of your attack. For example:
Automatically following redirections may sometimes cause problems for your attack. For example, if the application responds to a malicious request with a redirection to the logout page, then your session may be terminated.
The following settings are available:
Follow redirections - Control the targets of redirections. You can choose from:
Burp follows up to 10 chained redirections. A column in the results table indicates whether a redirect was followed for each individual result. The full requests and responses in the redirection chain are stored with each result item.
You can configure the types of redirection that Burp processes in the suite-wide redirection settings. These are found under Proxy in the Settings dialog. Click on Settings to open the dialog. For more information, see HTTP Settings.
It may be necessary to use only a single-threaded attack when following redirections. For example, when the application stores the result of the initial request within your session, and retrieves this when delivering the redirection response.
Use this setting to control whether Burp Intruder reuses connections to issue multiple HTTP/1 requests. This can greatly increase the speed of your attacks.
If you deselect HTTP/1 connection reuse, Burp opens a new connection for each request and closes it after receiving a response.
Use this setting to control whether Burp Intruder uses HTTP/2 or HTTP/1 for the current attack.
If you enable Override the project-level HTTP/2 setting, then Burp ignores the current project-level HTTP/2 setting configuration.
You can then choose whether to use HTTP/2 or HTTP/1 for the current attack. Select Default to HTTP/2 if the server supports it to use HTTP/2 with all servers that advertise support for it during the TLS handshake. Deselect this option to use HTTP/1 even if the server supports HTTP/2.
HTTP settings - HTTP/2 - Gives more information about the project-level HTTP/2 setting.