The Intruder page in the Settings dialog contains settings for the following:
The Intruder settings are all user settings. They apply to all installations of Burp on your machine.
To configure a Burp Intruder attack, you can modify the attack configuration settings in the Intruder tab. For more information, see Burp Intruder attack settings.
These settings control how Burp Intruder places automatic payload markers. The available options are:
This setting controls the attack configuration used when you open a new tab. The available options are:
These settings control what happens to an attack when you close a results window.
You can select what happens when you close an attack that is in progress. The available options are:
You can also select what happens to your attack data if you select to close a finished attack. The available options are:
These settings enable you to specify whether you use Burp's built-in payload lists or add your own custom payload lists:
To copy all of Burp's preconfigured payload lists into your custom directory, load a custom directory and select Copy.