Burp Suite Cheat Sheet
Web application security testing platform. Covers proxy configuration, Intruder attack types, Repeater workflows, scanner usage, and extending Burp with extensions.
Proxy Setup
Configure the default proxy listener address and port
$ Proxy > Options > Add listener on 127.0.0.1:8080Set up automatic header modification for intercepted requests
$ Proxy > Options > Intercept Client Requests > Match and ReplaceExport Burp CA cert for browser installation to intercept HTTPS
$ Project Options > SSL > Import CA CertificateFilter proxy history to show only target scope traffic
$ Proxy > HTTP history > Filter > Show only in-scope itemsAdd a regex pattern to define the target scope
$ Target > Scope > Add > .*\.target\.com$Intruder Attacks
Test one payload position at a time with a single wordlist
$ Intruder > Positions > Attack type: SniperTest all combinations of multiple payload sets across positions
$ Intruder > Positions > Attack type: Cluster BombExtract payload values from previous responses (CSRF token extraction)
$ Intruder > Payloads > Type: Recursive grepDefine patterns to extract from responses for result analysis
$ Intruder > Options > Grep - Extract > AddLimit request rate to avoid triggering WAF or rate limits
$ Intruder > Resource pool > Maximum concurrent requests: 5Repeater & Decoder
Send a request to Repeater for manual modification and replay
$ Right-click request > Send to RepeaterSend multiple tabs simultaneously for race condition testing
$ Repeater > Send group (parallel)Chain encoding operations for payload transformation
$ Decoder > Encode as > URL > Base64Visually diff two responses to identify behavioral differences
$ Comparer > Send response to ComparerScanner
Start a full crawl and active vulnerability scan
$ Dashboard > New scan > Crawl and AuditUse embedded browser for JavaScript-heavy application crawling
$ Dashboard > New scan > Crawl only > Configuration: Browser-poweredScan a specific portion of the site map only
$ Target > Site map > Right-click > Actively scan this branchGenerate a formatted HTML vulnerability report
$ Dashboard > Issue activity > Export as HTML reportExtensions
Install Autorize for automated authorization testing
$ Extender > BApp Store > Install: AutorizeInstall Logger++ for advanced request/response logging
$ Extender > BApp Store > Install: Logger++Install Param Miner for hidden parameter and header discovery
$ Extender > BApp Store > Install: Param MinerInstall Active Scan++ for additional active scan checks
$ Extender > BApp Store > Install: Active Scan++Configure path for custom extension JAR dependencies
$ Extender > Options > Java environment > Folder for loading library JAR files