Skip to main content


Burp Suite: A Step-by-Step Guide to Using Intruder

Futuristic Globalization Interface.

Burp Suite is a popular tool for web application testing, and one of its most powerful features is the Intruder. The Intruder allows you to perform automated tests on a target, such as brute-forcing or parameter fuzzing. In this blog, we’ll take a closer look at how to use Intruder in Burp Suite, step-by-step.

Step 1: Configure the Target

To get started with Intruder, you’ll need to have Burp Suite installed and running. Once you’ve done that, navigate to the “Target” tab in the top navigation bar. From here, you can add the target you want to test by clicking the “Add” button.

Bs Intruder Target Tab

Fig 1: Target tab inside Intruder tab in Burp Suite

Step 2: Configure the Test

Next, you’ll need to configure your test. Navigate to the “Intruder” tab and select the “Positions” subtab. This is where you’ll specify the parts of the request that you want to target.

To do this, select the “Add” button to add a new position. You can select either “Sniper” or “Battering Ram” mode, depending on the type of attack you want to perform. In “Sniper” mode, you’ll only target one parameter at a time, while in “Battering Ram” mode, you’ll target multiple parameters simultaneously.

Once you’ve selected your mode, you’ll need to specify the attack type. Burp Suite supports several different types, including brute force, cluster bomb, and pitchfork. You can also specify the payload type, which is the data you want to send to the target. For example, if you’re performing brute-forcing, the payload would be a list of potential passwords.

Bs Intruder Positions Tab

Fig 2: Positions tab inside Intruder tab in Burp Suite

Step 3: Start the Scan

Once you’ve configured your test, you can start the scan by clicking the “Start attack” button. Burp Suite will automatically send requests to the target using the specified attack type and payload.

Bs Intruder Payloads Tab

Fig 3: Payloads tab inside Intruder tab in Burp Suite

Bs Intruder Options Tab

Fig 4: Options tab inside Intruder tab in Burp Suite

Step 4: Review the Results

Once the scan is complete, you’ll be presented with a list of the requests that were sent to the target. This can be overwhelming at first, but it’s important to take the time to carefully review the results.

One of the most important things to look for is any unexpected or unusual behavior. For example, if the Intruder discovers a password that shouldn’t be publicly accessible, this could be a sign of a security vulnerability. Similarly, if the Intruder discovers a parameter that appears to be vulnerable to SQL injection or another common attack vector, this could be cause for concern.

Step 5: Take Action

If you do discover a vulnerability, it’s important to take action immediately. This may involve reporting the vulnerability to the site owner or developer, or taking steps to patch the vulnerability yourself if you have permission to do so.

Best Practices for Using Intruder

To get the most out of Intruder, it’s important to follow some best practices. Here are a few tips to keep in mind:

  • Make sure you have permission to perform the test. Unauthorized access to a target is illegal and can result in serious consequences.
  • Use a variety of payloads. Don’t just rely on a single list of potential passwords – mix things up to ensure that you’re covering all your bases.
  • Take the time to review the results carefully. Don’t just look at the requests that were successful – make sure to also review the failed requests to see if there are any patterns or vulnerabilities that you may have missed.
  • Don’t rely solely on automated tools. While Intruder is a powerful tool, it’s important to also perform manual testing to ensure that you’re catching everything.


In conclusion, Intruder is a valuable feature of Burp Suite that can help you identify potential security vulnerabilities in web application testing. However, it’s important to use it responsibly and with permission from the target owner. By following the best practices outlined in this guide, you can make the most out of Intruder and ensure that you’re catching any vulnerabilities that may exist. Remember to always review the results carefully and take action immediately if you do discover a vulnerability. With Intruder and Burp Suite, you can take your web application testing to the next level.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Sanskar Dwivedi

Sanskar Dwivedi is an Associate Technical Consultant at Perficient. He has an experience of combined 1.2 years of in Cyber Security and Testing. He is dedicated to staying up to date on the latest trends and technologies in these fields and is committed to researching and writing about tech.

More from this Author

Follow Us