Intruder

This is the core functionality of the application. This feature of Burp allows the user to automate the process that a user wants. The automation is used to perform attacks against web applications. This feature is highly customizable and can be used for various tasks, ranging from brute-force, right up to exploiting SQL injections and OS command injection, and so on.

The Intruder has four subtabs, which are:

  • Target 
  • Positions 
  • Payloads
  • Options

The Target tab shows the IP and port that the request is being sent to, along with the Start attack button. This button is clicked once and the setup for the particular request to be tested ...

Get Hands-On Application Penetration Testing with Burp Suite now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.