This guide walks you through creating Smart Scan rules step by step.
1οΈβ£ Step 1: Open the Rule Editor
Go to Burp Bounty Pro > Rules tab
Click Add to create a new rule
πͺ The rule editor dialog opens
Whether the rule is active
Detect Spring Boot and test actuators
3οΈβ£ Step 3: Define Match Conditions (IF)
Add one or more passive profile conditions that must be met before the rule triggers.
β Adding a Condition
Select the condition type:
π¨ Passive Request β Match against HTTP requests
π© Passive Response β Match against HTTP responses
Select the passive profile to reference
Set the logic operator (for the second condition onward):
β
AND β Both this condition and the previous must match
π OR β Either this condition or the previous must match
π Condition Examples
π Single condition:
β
Multiple AND conditions:
π Multiple OR conditions:
βοΈ Logic Evaluation
When combining AND and OR:
This evaluates as:
β
AND has higher precedence than OR.
4οΈβ£ Step 4: Define Execute Actions (THEN)
π Execute Specific Profiles
Run one or more named active profiles:
π·οΈ Execute by Tag
Run all active profiles that have a specific tag:
This is more maintainable than listing individual profiles β when you add new XSS profiles and tag them, they're automatically included in the rule.
π― Match Scope
Choose how many times the action executes:
Execute for every match of the passive condition
Execute only for the first match (avoids redundant scanning)
All Matches is the default and recommended for most cases. Use First Match when:
π The passive profile matches frequently and you only need one test
β¬οΈ You want to reduce scan load on the target
π₯οΈ The vulnerability check only needs to run once per host
5οΈβ£ Step 5: Save the Rule
πΎ Click Save to store the rule. It becomes immediately active if Enabled is set to true.
π‘ Tips for Effective Rules
π₯οΈ Use Technology Detection as Triggers
Create passive profiles that detect specific technologies, then trigger targeted CVE profiles:
π Use Parameter Detection for Vulnerability Classes
Create passive profiles that detect interesting parameters, then trigger the appropriate vulnerability profiles:
π Combine Request and Response Conditions
For more precise targeting, require both request and response conditions:
This avoids false triggers from URL patterns alone.
π¦ Start with Default Rules
Review the 27 default rules for patterns and inspiration. Most common scenarios are already covered.
π·οΈ Tag-Based Rules for Broad Scanning
Use tag-based execution for flexible, broad rules:
β οΈ Warning: Broad rules like these can generate a lot of traffic. Only enable them when needed and consider using "First Match" scope.
Last updated 14 hours ago