πŸ“šExamples

This page shows practical examples from the default rules shipped with Burp Bounty Pro.

πŸ–₯️ Technology Detection Rules

πŸ”΅ WordPress Rule

🎯 Goal: Detect WordPress sites and automatically test for common WordPress vulnerabilities.

IF: Passive Response profile "Wordpress detection" matches
THEN: Execute profiles:
  - Wordpress_user_enum_oembed
  - wordpress_users_enum_yoastseo
  - Wordpress_user_enum_json
  - Wordpress_directory_listing
  - Woody_Wordpress_RCE
  - CVE-2020-24312_File_Manager_Wordpress_Backups
  - Wordpress_Path_Traversal
  - Wordpress_Config_Accessible
  - easy_wp_smtp_listing_enabled
  - CVE-2020-11738_Wordpress_Duplicator_Plugin_LFI
Scope: First Match

The passive profile detects WordPress indicators in responses (e.g., wp-content, wp-includes), then 10 active profiles test for user enumeration, directory listing, RCE, path traversal, and config exposure.

πŸ”΅ Jira Rule

🎯 Goal: Detect Jira instances and test for known vulnerabilities.

πŸƒ Spring Boot Rule

🎯 Goal: Detect Spring Boot applications and test actuator endpoints.

πŸ’§ Drupal Rule

🎯 Goal: Detect Drupal CMS and test for user enumeration.

πŸ”— Combined Condition Rules

πŸ›‘οΈ Fortinet Rule

🎯 Goal: Detect Fortinet/FortiGate panels and test for credential disclosure.

This requires both request URL pattern AND response content to match before executing the CVE profile. This reduces false positives compared to checking only the URL.

🌐 Netsweeper Rule

🎯 Goal: Detect Netsweeper appliance and test for code injection.

πŸ—„οΈ CouchDB Rule

🎯 Goal: Detect CouchDB endpoints and test for admin exposure.

πŸ’‰ Vulnerability Parameter Detection Rules

πŸ—„οΈ SQL Injection Rule

🎯 Goal: Detect parameters commonly vulnerable to SQL injection and test them.

The passive profile detects parameters like id=, user_id=, query=, select=, etc.

πŸ’‰ XSS Rule

🎯 Goal: Detect XSS-prone parameters and test with various payloads.

⚑ RCE Rule

🎯 Goal: Detect RCE-prone parameters and test for command injection.

πŸ“‚ LFI Rule

🎯 Goal: Detect file path parameters and test for Local File Inclusion.

πŸ”„ Open Redirect / SSRF Rule

🎯 Goal: Detect URL-containing parameters and test for open redirect and SSRF.

πŸ”§ SSTI Rule

🎯 Goal: Detect template injection parameters and test for SSTI.

⚠️ Bulk Scanning Rules (Disabled by Default)

These rules are powerful but resource-intensive β€” they're disabled by default.

πŸ”„ Scan All Requests with All Profiles

⚠️ Warning: This runs ALL active profiles against ALL requests. Can consume excessive RAM and CPU. Use only on small targets with caution.

πŸ”„ Scan All Requests with Open Redirect Profiles

🌐 Scan All Requests with SSRF Profiles

πŸ› Scan All Requests with Log4Shell

Last updated