These articles cover the basics of using Burp Intruder. We plan to add more articules to this topic in the near future. If you need more assistance, please refer to the Burp documentation.
- Common Uses for Burp Intruder
- Configuring a Burp Intruder Attack
- Analyzing Burp Intruder Attack Results