To access material, start machines and answer questions login.
Welcome to the Burp Suite Intruder room!
In this room, we will explore 's Intruder module, which offers automated request manipulation and enables tasks such as fuzzing and brute-forcing. If you are not familiar with 's and Repeater functionality, it is recommended to complete at least the Burp Basics room before proceeding.
's Intruder module is a powerful tool that allows for automated and customisable attacks. It provides the ability to modify specific parts of a request and perform repetitive tests with variations of input data. Intruder is particularly useful for tasks like fuzzing and brute-forcing, where different values need to be tested against a target.
Deploy the target attached to this task by pressing the green Start Machine button. Also, start the AttackBox by pressing the blue Start AttackBox button at the top of this room if you are not using your own machine. Then start Burp and follow along with the next tasks.
Let's get started!
Ready to learn Cyber Security?
The Burp Suite: Intruder room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
