Using Burp Scanner
https://portswigger.net/web-security/essential-skills/using-burp-scanner-during-manual-testing
Scanning a specific request
When you come across an interesting function or behavior, your first instinct may be to send the relevant requests to Repeater or Intruder and investigate further.
In the Pro vs, If you right-click on a request and select Do active scan, Burp Scanner will use its default configuration to audit only this request.
This may not catch every last vulnerability, but it could potentially flag things up in seconds that could otherwise have taken hours to find. It may also help you to rule out certain attacks almost immediately.
Scanning custom insertion points
In the Pro vs, is possible to limit scans setting a custom insertion points.
For people that have Community Edition is possible to use a similar method thanks to Intruder, where we select an insertion point, typically a parameter value (eg. id value) and inject which we want.
Scanning non-standard data structures
Talking about non-standard data structures eg. user=048857-carlos
the '-' character can undestand an additional data, so we can consider onlu 'carlos' value scanning a defined selected insertion point or using Intruder.
Labs 🔬
Discovering vulnerabilities quickly with targeted scanning
Scanning non-standard data structures
Last updated