Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Burp Suite: Intruder

Premium room

Learn how to use Intruder to automate requests in Burp Suite.

medium

90 min

72,570

User profile photo.
User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Welcome to the Burp Suite Intruder room!

In this room, we will explore 's Intruder module, which offers automated request manipulation and enables tasks such as fuzzing and brute-forcing. If you are not familiar with 's and Repeater functionality, it is recommended to complete at least the Burp Basics room before proceeding.

's Intruder module is a powerful tool that allows for automated and customisable attacks. It provides the ability to modify specific parts of a request and perform repetitive tests with variations of input data. Intruder is particularly useful for tasks like fuzzing and brute-forcing, where different values need to be tested against a target.

Deploy the target attached to this task by pressing the green Start Machine button. Also, start the AttackBox by pressing the blue Start AttackBox button at the top of this room if you are not using your own machine. Then start Burp and follow along with the next tasks.

Answer the questions below

Let's get started!

Ready to learn Cyber Security?

The Burp Suite: Intruder room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.