πŸš€Quick Start

This guide walks you through running your first scan with Burp Bounty Pro in under 5 minutes.

Step 1️⃣ β€” Browse to a Target

  1. Configure your browser to use Burp Suite as a proxy

  2. Browse to the target web application

  3. Ensure the target appears in Burp Suite's Target > Site Map

Step 2️⃣ β€” Select Profiles

  1. Go to the Burp Bounty Pro tab > Profiles sub-tab

  2. Review the three profile categories:

    • 🎯 Active Profiles β€” Profiles that send payloads to test for vulnerabilities

    • πŸ“¨ Passive Request Profiles β€” Profiles that analyze outgoing requests

    • πŸ“© Passive Response Profiles β€” Profiles that analyze incoming responses

  3. Each table shows: Enabled, Profile Name, Tags, and Author's Twitter

  4. Enable or disable profiles using the Enabled checkbox in each profile row

  5. All default profiles are enabled by default

Active Profiles table

πŸ’‘ Tip: Use the tag dropdown at the top to filter profiles by category (XSS, SQLi, CVEs, etc.) and focus on what matters for your target.

Step 3️⃣ β€” Enable Smart Scan Rules (Optional)

  1. Go to the Rules sub-tab

  2. Review the available rules β€” these define IF-THEN conditions that automatically trigger active scans when passive matches are found

  3. Enable the rules you want (most are enabled by default)

Step 4️⃣ β€” Launch an Active Scan

  1. In Burp Suite, right-click on target URLs in Target > Site Map, Proxy History, or Repeater

  2. Select Active Scan from the Burp Bounty Pro context menu

  3. The URL Filter popup appears β€” review the URLs, configure Scanner Settings (Threads, Concurrency, RPS), and click OK

  4. Burp Bounty Pro launches the scan with your per-scan settings 🎯

URL Filter popup with Scanner Settings

πŸ’‘ Tip: For fast targets, increase threads to 20. For rate-limited targets, decrease to 3 and set RPS to 2.

Step 5️⃣ β€” Launch a Passive Scan

Passive scanning can run in two ways:

πŸ”„ Automatic (Live Passive Scan)

  1. In the Dashboard tab, toggle Live Passive Scan on

  2. All traffic passing through Burp Suite is automatically analyzed

🏷️ Manual (Tag-Based)

  1. Right-click on one or more requests

  2. Select Passive Scan from the context menu

  3. Choose the scope from the tag-based submenu:

    • All β€” Run all passive profiles

    • Passive Request > Tag β€” Run only request profiles with a specific tag

    • Passive Response > Tag β€” Run only response profiles with a specific tag

Passive Scan context menu with tags

Step 6️⃣ β€” Monitor and Control Results

  1. Go to the Burp Bounty Pro tab > Dashboard sub-tab

  2. The dashboard shows:

    • πŸ“Š Scanner progress β€” Active tasks, completed scans, and queue status

    • πŸ› Issues found β€” Detected vulnerabilities with severity, confidence, and details

  3. Use the control buttons:

    • ⏸️ Pause All β€” Pause all scans without losing progress

    • ▢️ Resume All β€” Resume paused scans from where they left off

    • ⏹️ Stop β€” Stop all scans

Dashboard with scan progress and issues

Step 7️⃣ β€” Review Findings

Each issue reported includes:

  • πŸ“› Issue Name β€” The vulnerability type (e.g., "XSS", "SQLi", "CORS Misconfiguration")

  • πŸ”΄πŸŸ πŸŸ‘πŸ”΅ Severity β€” High, Medium, Low, or Information

  • 🎯 Confidence β€” Certain, Firm, or Tentative

  • πŸ“ Detail β€” The payload used and the grep pattern that matched

Issues also appear in Burp Suite's Dashboard > Issue activity for integrated review.

πŸ“Œ Next Steps

  • πŸ–₯️ Interface Overview β€” Learn about all the tabs and controls

  • πŸ“ Creating Active Profiles β€” Create your own vulnerability detection profiles

  • 🧠 Smart Scan β€” Set up automated scanning workflows with Rules

  • βš™οΈ Scan Control β€” Learn about pause/resume, per-scan settings, and performance tuning

  • 🏷️ Tags β€” Organize profiles and launch targeted passive scans

  • πŸ”€ Global Variables β€” Configure variables like {REDIRECT_DOMAIN} and {BC}

Last updated