DEV Community

Naveen Karasu
Naveen Karasu

Posted on

Burp Suite Advanced Features: Intruder Attack Types Explained

Burp Intruder Attack Types: When to Use Each One

Day 9 of my pentesting challenge. Intruder's four attack types confuse people, so here is the cheat sheet.

Sniper -- Independent Parameter Testing

One list, multiple positions, tested one at a time. Use for finding which parameter is injectable:

POST /search HTTP/1.1
Content-Type: application/x-www-form-urlencoded

query=$$test$$&category=$$all$$&sort=$$date$$
Enter fullscreen mode Exit fullscreen mode

With an XSS payload list, Sniper tests query with all payloads while category and sort stay default, then moves to category, then sort. Three positions, 50 payloads = 150 requests.

Pitchfork -- Paired Credential Testing

Multiple lists in parallel. Position 1 gets list 1, position 2 gets list 2:

List 1 (emails): alice@corp.com, bob@corp.com
List 2 (passwords): Spring2026!, Welcome1

Request 1: alice@corp.com / Spring2026!
Request 2: bob@corp.com / Welcome1
Enter fullscreen mode Exit fullscreen mode

Use when you have matched pairs from OSINT or breach data.

Cluster Bomb -- Full Combination

Every value in list 1 x every value in list 2. Expensive but thorough. 100 x 100 = 10,000 requests.

Reading Results

Sort by response length, not status code. When testing privilege escalation on admin endpoints:

GET /admin/$$path$$ HTTP/1.1
Cookie: session=<regular_user_token>
Enter fullscreen mode Exit fullscreen mode

Most responses: 403 at ~90 bytes. A few 200s at 2,000+ bytes? Those admin pages have no server-side role checks. Real bug, found in seconds.

Top comments (0)