β‘Quick Start
This guide walks you through running your first scan with Burp Bounty Pro in under 5 minutes.
Step 1οΈβ£ β Browse to a Target
Configure your browser to use Burp Suite as a proxy
Browse to the target web application
Ensure the target appears in Burp Suite's Target > Site Map
Step 2οΈβ£ β Select Profiles
Go to the Burp Bounty Pro tab > Profiles sub-tab
Review the three profile categories:
π― Active Profiles β Profiles that send payloads to test for vulnerabilities
π¨ Passive Request Profiles β Profiles that analyze outgoing requests
π© Passive Response Profiles β Profiles that analyze incoming responses
Each table shows: Enabled, Profile Name, Tags, and Author's Twitter
Enable or disable profiles using the Enabled checkbox in each profile row
All default profiles are enabled by default
π‘ Tip: Use the tag dropdown at the top to filter profiles by category (XSS, SQLi, CVEs, etc.) and focus on what matters for your target.
Step 3οΈβ£ β Enable Smart Scan Rules (Optional)
Go to the Rules sub-tab
Review the available rules β these define IF-THEN conditions that automatically trigger active scans when passive matches are found
Enable the rules you want (most are enabled by default)
Step 4οΈβ£ β Launch an Active Scan
In Burp Suite, right-click on target URLs in Target > Site Map, Proxy History, or Repeater
Select Active Scan from the Burp Bounty Pro context menu
The URL Filter popup appears β review the URLs, configure Scanner Settings (Threads, Concurrency, RPS), and click OK
Burp Bounty Pro launches the scan with your per-scan settings π―
π‘ Tip: For fast targets, increase threads to 20. For rate-limited targets, decrease to 3 and set RPS to 2.
Step 5οΈβ£ β Launch a Passive Scan
Passive scanning can run in two ways:
π Automatic (Live Passive Scan)
In the Dashboard tab, toggle Live Passive Scan on
All traffic passing through Burp Suite is automatically analyzed
π·οΈ Manual (Tag-Based)
Right-click on one or more requests
Select Passive Scan from the context menu
Choose the scope from the tag-based submenu:
All β Run all passive profiles
Passive Request > Tag β Run only request profiles with a specific tag
Passive Response > Tag β Run only response profiles with a specific tag
Step 6οΈβ£ β Monitor and Control Results
Go to the Burp Bounty Pro tab > Dashboard sub-tab
The dashboard shows:
π Scanner progress β Active tasks, completed scans, and queue status
π Issues found β Detected vulnerabilities with severity, confidence, and details
Use the control buttons:
βΈοΈ Pause All β Pause all scans without losing progress
βΆοΈ Resume All β Resume paused scans from where they left off
βΉοΈ Stop β Stop all scans
Step 7οΈβ£ β Review Findings
Each issue reported includes:
π Issue Name β The vulnerability type (e.g., "XSS", "SQLi", "CORS Misconfiguration")
π΄π π‘π΅ Severity β High, Medium, Low, or Information
π― Confidence β Certain, Firm, or Tentative
π Detail β The payload used and the grep pattern that matched
Issues also appear in Burp Suite's Dashboard > Issue activity for integrated review.
π Next Steps
π₯οΈ Interface Overview β Learn about all the tabs and controls
π Creating Active Profiles β Create your own vulnerability detection profiles
π§ Smart Scan β Set up automated scanning workflows with Rules
βοΈ Scan Control β Learn about pause/resume, per-scan settings, and performance tuning
π·οΈ Tags β Organize profiles and launch targeted passive scans
π Global Variables β Configure variables like
{REDIRECT_DOMAIN}and{BC}
Last updated