\n# Encode as: URL, HTML, Base64\n# Output: %3Cscript%3Ealert%281%29%3C%2Fscript%3E\n# Decode: Paste encoded payload β†’ Smart decode","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#snippet-15","name":"Comparer Tool for Response Differential Analysis","description":"Code example","text":"# Send 2 requests to Repeater with different payloads\n# Right-click response 1 β†’ Send to Comparer\n# Right-click response 2 β†’ Send to Comparer\n# Comparer tab β†’ Words/Bytes comparison\n# Differences highlighted","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#snippet-16","name":"Scope Configuration for Targeted Testing","description":"Code example","text":"# Target β†’ Scope β†’ Include in scope\n# Add: ^https?://app\\.target\\.com.*$\n# Exclude: ^https?://app\\.target\\.com/cdn/.*$\n# Proxy β†’ Options β†’ Intercept Client Requests\n# Enable: And URL is in target scope\n# Only in-scope traffic intercepted","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#snippet-17","name":"Burp Sequencer for Token Entropy Analysis","description":"Code example","text":"# Capture session token generation endpoint\n# Send to Sequencer\n# Token location within response: Highlight token value\n# Start live capture (10,000 tokens recommended)\n# Analyze: Effective entropy, character-level analysis\n# Stop","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#snippet-18","name":"Content Discovery with Intruder and Custom Wordlist","description":"Code example","text":"# Request: GET /Β§pathΒ§\n# Intruder β†’ Attack type: Sniper\n# Payloads: Load /usr/share/seclists/Discovery/Web-Content/raft-large-directories.txt\n# Grep - Match: 200, 301, 403\n# Options β†’ Follow redirections: Never\n# Start attack","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#snippet-19","name":"Save/Restore Burp State for Session Persistence","description":"Code example","text":"# Burp menu β†’ Project β†’ Save project\n# Save to: pentesting-target-2025-12-03.burp\n# Close Burp\n# Reopen: java -jar burpsuite_pro.jar\n# Burp menu β†’ Project β†’ Open project\n# Select: pentesting-target-2025-12-03.burp","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#snippet-20","name":"AI-Powered Vulnerability Exploration (2025 Feature)","description":"Code example","text":"# Scanner detects SQLi vulnerability\n# Dashboard β†’ Issues β†’ Right-click issue\n# AI Actions β†’ Explore Issue\n# AI autonomously attempts exploitation\n# Review: AI-generated proof-of-concept","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#snippet-21","name":"API Testing with JSON Content Type Override","description":"Code example","text":"# Repeater β†’ Request:\n# POST /api/users\n# Content-Type: application/json\n# Body: {\"username\":\"test\",\"role\":\"admin\"}\n# Right-click β†’ Change request method: PUT\n# Modify role: \"superadmin\"\n# Send","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#snippet-22","name":"Browser Integration for Automated Login Recording","description":"Code example","text":"# Proxy β†’ Intercept is on\n# Proxy β†’ Open browser (Burp's embedded Chromium)\n# Navigate to https://target.com/login\n# Enter credentials β†’ Login\n# Proxy β†’ HTTP history: Review login sequence\n# Settings β†’ Sessions β†’ Macros β†’ Record: Select login requests","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#snippet-23","name":"SSL Pass Through for Non-HTTP Protocols","description":"Code example","text":"# Proxy β†’ Options β†’ TLS Pass Through\n# Add rule:\n# ^websocket\\.target\\.com:443$\n# Burp now bypasses WebSocket traffic without interception\n# Prevents connection errors","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#snippet-24","name":"Export Scanner Report in HTML/XML Format","description":"Code example","text":"# Target β†’ Site map β†’ Issues\n# Select all issues\n# Right-click β†’ Report selected issues\n# Format: HTML/XML\n# Include: Request/Response, Remediation\n# Export: burp-report-2025-12-03.html","inLanguage":"bash"}],"keywords":"burp suite advanced, burp suite professional, web application penetration testing, burp intruder attacks, burp scanner optimization, session handling macros, burp suite tutorial, security automation, burp-suite, penetration-testing, web-security, vulnerability-assessment, security-automation","about":[{"@type":"Thing","name":"burp-suite"},{"@type":"Thing","name":"penetration-testing"},{"@type":"Thing","name":"web-security"},{"@type":"Thing","name":"vulnerability-assessment"},{"@type":"Thing","name":"security-automation"}]},{"@type":"ItemList","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#topics","name":"Core Concepts - Burp Suite Advanced DATA | Professional Testing + Security Automation Guide","numberOfItems":6,"itemListElement":[{"@type":"ListItem","position":1,"name":"INTRUDER ATTACK TYPES: Sniper vs Pitchfork vs Cluster Bomb","description":"Sniper tests one position at a time with single payload set (n*m requests). Pitchfork iterates multiple positions simultaneously with separate payload sets (n requests). Cluster Bomb tests all combinations across positions (n*m*o*p requests). See sniper fuzzing examples below","url":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#core-concepts"},{"@type":"ListItem","position":2,"name":"SCANNER OPTIMIZATION: Crawl strategy and audit configuration","description":"Burp Scanner 2025 includes AI-powered crawling. Configure crawl depth (10 default), max links/page (100), audit intensity (normal/thorough). Use 'Crawl strategy - faster' for time-constrained assessments","url":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#core-concepts"},{"@type":"ListItem","position":3,"name":"SESSION HANDLING RULES: Macros for authentication persistence","description":"Macros extract dynamic tokens from responses and inject into subsequent requests. Configure: Settings β†’ Sessions β†’ Macros β†’ Add β†’ Record login sequence. Essential for testing authenticated endpoints","url":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#core-concepts"},{"@type":"ListItem","position":4,"name":"REPEATER ADVANCED: AI-powered custom actions and request chaining","description":"Burp Repeater 2025.5.3 introduces AI custom actions for automated exploit investigation. Right-click response β†’ AI Actions β†’ 'Explore vulnerability' or 'Suggest payloads'. Chain requests using tab groups","url":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#core-concepts"},{"@type":"ListItem","position":5,"name":"COLLABORATOR CLIENT: Out-of-band interaction detection","description":"Burp Collaborator detects SSRF, blind XXE, DNS exfiltration. Professional 2025 supports private Collaborator servers. Monitor: Burp menu β†’ Collaborator client β†’ Poll now","url":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#core-concepts"},{"@type":"ListItem","position":6,"name":"EXTENSIONS ECOSYSTEM: BApp Store and Montoya API","description":"Install extensions for specialized testing: Autorize (authorization bypass), Turbo Intruder (race conditions), Logger++ (advanced logging). Montoya API 2025 supports AI-powered extensions","url":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#core-concepts"}]},{"@type":"TechArticle","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#article","headline":"Burp Suite Advanced DATA | Professional Testing + Security Automation Guide","description":"Complete reference guide","image":[{"@type":"ImageObject","url":"https://yourcheatsheet.org/images/burp-suite-advanced-og","width":1200,"height":630},{"@type":"ImageObject","url":"https://yourcheatsheet.org/images/burp-suite-advanced-og","width":800,"height":800}],"author":{"@id":"https://yourcheatsheet.org/author/carla-stevens"},"publisher":{"@id":"https://yourcheatsheet.org/about"},"inLanguage":"en-US","isAccessibleForFree":true,"keywords":"burp suite advanced, burp suite professional, web application penetration testing, burp intruder attacks, burp scanner optimization, session handling macros, burp suite tutorial, security automation, burp-suite, penetration-testing, web-security, vulnerability-assessment, security-automation","speakable":{"@type":"SpeakableSpecification","cssSelector":["#top","#quick-start","#when-to-use","#core-concepts","#snippets","#master-commands","#production-examples","#production-fixes","#pitfalls","#troubleshooting","#elite-pro-hack","#workflows","#benchmark","#resources"]},"potentialAction":[{"@type":"ReadAction","target":{"@type":"EntryPoint","urlTemplate":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced"}},{"@type":"DownloadAction","name":"Download PDF","target":{"@type":"EntryPoint","urlTemplate":"https://yourcheatsheets.org/downloads/burp-suite-advanced.pdf"}}]},{"@type":"BreadcrumbList","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://yourcheatsheet.org"},{"@type":"ListItem","position":2,"name":"Security-Testing","item":"https://yourcheatsheet.org/categories/Security-Testing"},{"@type":"ListItem","position":3,"name":"Burp Suite Advanced DATA | Professional Testing + Security Automation Guide","item":"https://yourcheatsheets.org/cheatsheets/burp-suite-advanced"}]}]}

Quick Start with Burp Suite Advanced

Production-ready compilation flags and build commands

PROFESSIONAL SCANNER: QUICK START (5s)

Copy β†’ Paste β†’ Live

# Launch Burp Suite Professional 2025
java -jar -Xmx4g burpsuite_pro_v2025.5.3.jar
# Set proxy: localhost:8080
# Browser β†’ Proxy settings β†’ HTTP Proxy: 127.0.0.1:8080
# Target β†’ Site map β†’ Right-click domain β†’ Scan
$
βœ… Burp proxy intercepts traffic on 127.0.0.1:8080 | Scanner dashboard shows active crawl + audit. Learn more in automated vulnerability scanning section
⚑ 5s Setup

When to Use Burp Suite Advanced

Decision matrix per scegliere la tecnologia giusta

IDEAL USE CASES

  • Enterprise web application penetration testing requiring advanced scanner configuration and custom insertion points

  • API security assessments with complex authentication flows using macros and session handling rules

  • Large-scale vulnerability discovery campaigns leveraging Intruder attack types (Sniper, Pitchfork, Cluster Bomb) with AI-powered analysis

AVOID FOR

  • Simple website browsing without security testing requirements - basic proxy tools suffice

  • Mobile app testing without HTTP/HTTPS traffic - use platform-specific tools instead

  • Automated compliance scanning where manual verification isn't needed - dedicated compliance scanners more efficient

Core Concepts of Burp Suite Advanced

Production-ready compilation flags and build commands

#1

INTRUDER ATTACK TYPES: Sniper vs Pitchfork vs Cluster Bomb

Sniper tests one position at a time with single payload set (n*m requests). Pitchfork iterates multiple positions simultaneously with separate payload sets (n requests). Cluster Bomb tests all combinations across positions (n*m*o*p requests). See sniper fuzzing examples below

βœ“ Solution
Use Sniper for single parameter fuzzing, Pitchfork for parallel iteration (username+password)
+89% efficiency
#2

SCANNER OPTIMIZATION: Crawl strategy and audit configuration

Burp Scanner 2025 includes AI-powered crawling. Configure crawl depth (10 default), max links/page (100), audit intensity (normal/thorough). Use 'Crawl strategy - faster' for time-constrained assessments

+67% faster scans
#3

SESSION HANDLING RULES: Macros for authentication persistence

Macros extract dynamic tokens from responses and inject into subsequent requests. Configure: Settings β†’ Sessions β†’ Macros β†’ Add β†’ Record login sequence. Essential for testing authenticated endpoints

βœ“ Solution
Use custom parameter location with JSONPath: $.data.token instead of regex
2.3x faster than manual token updates
#4

REPEATER ADVANCED: AI-powered custom actions and request chaining

Burp Repeater 2025.5.3 introduces AI custom actions for automated exploit investigation. Right-click response β†’ AI Actions β†’ 'Explore vulnerability' or 'Suggest payloads'. Chain requests using tab groups

βœ“ Solution
Use Ctrl+R to rename tabs with descriptive labels: 'SQLi-test-user-param'
+54% productivity
#5

COLLABORATOR CLIENT: Out-of-band interaction detection

Burp Collaborator detects SSRF, blind XXE, DNS exfiltration. Professional 2025 supports private Collaborator servers. Monitor: Burp menu β†’ Collaborator client β†’ Poll now

+91% blind vulnerability detection
#6

EXTENSIONS ECOSYSTEM: BApp Store and Montoya API

Install extensions for specialized testing: Autorize (authorization bypass), Turbo Intruder (race conditions), Logger++ (advanced logging). Montoya API 2025 supports AI-powered extensions

βœ“ Solution
Enable only needed extensions, allocate 4GB+ heap: -Xmx4g
+35% capability expansion