πŸ“Creating Rules

This guide walks you through creating Smart Scan rules step by step.

1️⃣ Step 1: Open the Rule Editor

  1. Go to Burp Bounty Pro > Rules tab

  2. Click Add to create a new rule

  3. πŸͺŸ The rule editor dialog opens

2️⃣ Step 2: Basic Information

Field
Description
Example

πŸ“ Rule Name

Unique identifier

My_Custom_Rule

βœ… Enabled

Whether the rule is active

true

πŸ“„ Description

What the rule does

Detect Spring Boot and test actuators

3️⃣ Step 3: Define Match Conditions (IF)

Add one or more passive profile conditions that must be met before the rule triggers.

βž• Adding a Condition

  1. Select the condition type:

    • πŸ“¨ Passive Request β€” Match against HTTP requests

    • πŸ“© Passive Response β€” Match against HTTP responses

  2. Select the passive profile to reference

  3. Set the logic operator (for the second condition onward):

    • βœ… AND β€” Both this condition and the previous must match

    • πŸ”€ OR β€” Either this condition or the previous must match

πŸ“š Condition Examples

πŸ” Single condition:

βœ… Multiple AND conditions:

πŸ”€ Multiple OR conditions:

βš™οΈ Logic Evaluation

When combining AND and OR:

This evaluates as:

βœ… AND has higher precedence than OR.

4️⃣ Step 4: Define Execute Actions (THEN)

πŸ“ Execute Specific Profiles

Run one or more named active profiles:

🏷️ Execute by Tag

Run all active profiles that have a specific tag:

This is more maintainable than listing individual profiles β€” when you add new XSS profiles and tag them, they're automatically included in the rule.

🎯 Match Scope

Choose how many times the action executes:

Scope
Behavior

πŸ”„ All Matches

Execute for every match of the passive condition

1️⃣ First Match

Execute only for the first match (avoids redundant scanning)

All Matches is the default and recommended for most cases. Use First Match when:

  • πŸ”„ The passive profile matches frequently and you only need one test

  • ⬇️ You want to reduce scan load on the target

  • πŸ–₯️ The vulnerability check only needs to run once per host

5️⃣ Step 5: Save the Rule

πŸ’Ύ Click Save to store the rule. It becomes immediately active if Enabled is set to true.

πŸ’‘ Tips for Effective Rules

πŸ–₯️ Use Technology Detection as Triggers

Create passive profiles that detect specific technologies, then trigger targeted CVE profiles:

πŸ’‰ Use Parameter Detection for Vulnerability Classes

Create passive profiles that detect interesting parameters, then trigger the appropriate vulnerability profiles:

πŸ”— Combine Request and Response Conditions

For more precise targeting, require both request and response conditions:

This avoids false triggers from URL patterns alone.

πŸ“¦ Start with Default Rules

Review the 27 default rules for patterns and inspiration. Most common scenarios are already covered.

🏷️ Tag-Based Rules for Broad Scanning

Use tag-based execution for flexible, broad rules:

⚠️ Warning: Broad rules like these can generate a lot of traffic. Only enable them when needed and consider using "First Match" scope.

Last updated