ποΈPassive Scan
Passive scanning analyzes HTTP traffic passing through Burp Suite without sending any additional requests. It can run automatically in the background (Live Passive Scan) or be launched manually against selected requests with fine-grained tag-based filtering.
π Types of Passive Profiles
Burp Bounty Pro has two types of passive profiles:
π© Passive Response Profiles
Scanner type: 2
Analyze HTTP responses received from the server. Use these to detect:
π Sensitive information disclosure (API keys, tokens, credentials)
π‘οΈ Security header misconfigurations (CSP, HSTS, X-Frame-Options)
π₯οΈ Technology fingerprinting (server banners, framework detection)
β οΈ Error messages and debug information
π Domain takeover indicators
π Hardcoded secrets and configuration data
How it works:
Burp Suite receives an HTTP response
All enabled Passive Response profiles are checked against the response
Each profile's grep patterns are matched against the response body and/or headers
If conditions match, an information issue is reported
π¨ Passive Request Profiles
Scanner type: 3
Analyze HTTP requests sent by the browser or client. Use these to detect:
π Interesting parameters (SQLi, XSS, SSRF, RCE candidates)
π API endpoints and technology indicators
π Authentication tokens and session identifiers
π₯οΈ URL patterns suggesting specific technologies (Jira, WordPress, etc.)
π Debug and testing parameters
How it works:
Burp Suite intercepts an HTTP request
All enabled Passive Request profiles are checked against the request
Each profile's grep patterns are matched against the request URL, headers, and/or body
If conditions match, an information issue is reported
π Launching a Passive Scan
π±οΈ Manual Passive Scan (Context Menu)
You can manually launch passive scans against selected requests from anywhere in Burp Suite:
Select one or more requests in Proxy History, Target Site Map, Repeater, or any other Burp tool
Right-click and select Passive Scan
Choose the scope of the scan from the submenu:
π·οΈ Tag-Based Passive Scan Submenu
Each menu item shows the count of matching profiles in parentheses. Tags are sorted alphabetically, with "All" always at the top.
Benefits of tag-based launching:
π― Focused scanning β Run only the passive profiles relevant to your current task
β‘ Faster results β Skip irrelevant profiles to reduce processing time
π Organized workflow β Group profiles by vulnerability class, technology, or engagement
π‘ Example: You've just discovered a new WordPress site. Right-click the request, select Passive Scan > Passive Response > Technology to quickly check what technologies are detected, without running all 125 passive profiles.
π Live Passive Scan (Automatic)
Live Passive Scan runs automatically in the background as traffic passes through Burp Suite:
Go to the Burp Bounty Pro tab > Dashboard
Toggle the Live Passive Scan button to "on"
All HTTP traffic passing through Burp Suite is automatically analyzed by enabled passive profiles
When enabled, the Scope Only checkbox restricts scanning to in-scope targets
π URL Filtering
When launching passive scans manually, the URL filter popup appears (same as Active Scan), giving you control over:
β Which URLs to include/exclude
π Domain filtering
π File extension filtering
π Match and Replace rules for request modification
π Passive Scan Flow
π Managing Passive Profiles
π Profile Tables
Passive profiles are displayed in two tables within the Profiles tab:
β Enabled
Checkbox to enable/disable the profile
π Profile Name
Name of the passive profile
π·οΈ Tags
Tags assigned to the profile (e.g., "All, Security_Headers, Secrets")
π¦ Author's Twitter
Profile author's Twitter handle
π±οΈ Context Menu (Right-Click)
Right-click on one or more selected profiles to access:
β Enable
Enable the selected profile(s)
β Disable
Disable the selected profile(s)
π·οΈ Set New Tag
Assign a new tag to the selected profile(s). Opens a dialog where you enter the tag name. The tag is added to the profile's .bb file and appears in the Tags column.
π‘ Tip: Select multiple profiles with Ctrl+Click or Shift+Click, then right-click Set New Tag to tag them all at once. This is a fast way to organize your passive profiles into categories.
π§ Integration with Smart Scan
Passive scan findings are the foundation of Smart Scan rules. When a passive profile matches, it can automatically trigger active scanning:
For example:
π¨ Passive Request profile detects WordPress URLs β Rule triggers WordPress vulnerability profiles
π© Passive Response profile detects Jira headers β Rule triggers Jira CVE profiles
π¨ Passive Request profile detects SQLi-like parameters β Rule triggers SQLi active profiles
See Smart Scan for details.
π« Excluded File Extensions
To reduce noise, passive scanning automatically excludes responses with these file extensions:
jpg, gif, png, css, svg, woff, woff2, ttf, eot, ico, pdf, swf, mp3, mp4, avi, mov
π Creating Passive Profiles
Passive profiles use the same grep/match system as active profiles but without payloads or insertion points. See:
π Grep Options
π·οΈ Tags β How to organize profiles with tags
π Examples
π‘οΈ Detecting Missing Security Headers
A Passive Response profile that checks for missing Strict-Transport-Security header:
The NotResponse: true flag inverts the match β the issue is reported when the pattern is NOT found.
π Detecting Interesting Parameters
A Passive Request profile that detects URL parameters commonly associated with SQL injection:
π Workflow: Tag-Based Passive Scan
π·οΈ Organize passive profiles with descriptive tags:
Security header profiles β
Security_HeadersSecret detection profiles β
SecretsParameter detection profiles β
ParametersCookie analysis profiles β
Cookie_Security
π― Launch focused scans from the context menu:
Quick security header audit β Passive Response > Security_Headers
Check for leaked secrets β Passive Response > Secrets
Identify interesting parameters β Passive Request > Parameters
π§ Combine with Smart Scan for automation:
Parameter detection β automatically trigger SQLi/XSS active profiles
Technology detection β automatically trigger CVE profiles
Last updated