Burp Suite Intruder – Attack Type Methodology & Decision Framework


Summary

  1. Objective
  2. Pre-Execution Controls & Safeguards
  3. Attack Escalation Strategy
  4. Attack Selection Decision Tree
  5. Attack Type Definitions & Execution Models

1. Objective

This document defines a methodology for selecting and executing Intruder attack types during authorized web application security assessments.


2. Pre-Execution Controls & Safeguards

Before selecting an attack type:

  1. Estimate request count.
  2. Confirm brute-force authorization.
  3. Assess rate limiting.
  4. Monitor for account lockout.
  5. Log evidence properly.
  6. Configure appropriate request throttling settings.

3. Attack Escalation Strategy

Methodology recommends escalation:

  1. Begin with Sniper to identify response behavior.
  2. Use Battering Ram when duplication logic is suspected.
  3. Apply Pitchfork for known credential pairs.
  4. Escalate to Cluster Bomb only when justified and authorized, as this mode may significantly increase request volume.

4. Attack Selection Decision Tree

                        ┌────────────────────────────┐
                        │  What are you testing?     │
                        └──────────────┬─────────────┘
                                       │
                    ┌──────────────────┴──────────────────┐
                    │                                     │
        ┌───────────▼───────────┐             ┌──────────▼──────────┐
        │ Single parameter only?│             │ Multiple parameters? │
        └───────────┬───────────┘             └──────────┬──────────┘
                    │ Yes                                  │ Yes
                    ▼                                      ▼
           ┌───────────────────┐              ┌────────────────────────────┐
           │ Use SNIPER        │              │ Do parameters need         │
           │                   │              │ identical values?          │
           └───────────────────┘              └──────────────┬─────────────┘
                                                             │
                                            ┌────────────────┴───────────────┐
                                            │                                │
                                           Yes                               No
                                            │                                │
                                            ▼                                ▼
                                ┌────────────────────┐        ┌────────────────────────────┐
                                │ Use BATTERING RAM  │        │ Are values correlated?     │
                                │ (same payload      │        │ (e.g., known pairs)        │
                                │ everywhere)        │        └──────────────┬─────────────┘
                                └────────────────────┘                       │
                                                                      ┌───────┴────────┐
                                                                      │                │
                                                                     Yes               No
                                                                      │                │
                                                                      ▼                ▼
                                                         ┌──────────────────┐   ┌─────────────────────┐
                                                         │ Use PITCHFORK    │   │ Use CLUSTER BOMB    │
                                                         │ (parallel lists) │   │ (all combinations)  │
                                                         └──────────────────┘   └─────────────────────┘

5. Attack Type Definitions & Execution Models


5.1 Sniper Attack

Purpose

Tests a single injection position sequentially using one payload set.

Target Example

username=§user§&password=pass

Payload Set (Single List)

payload1
payload2
payload3
payload4
payload5
payload6

Execution Model

RequestPayloadSent Request
1payload1username=payload1&password=pass
2payload2username=payload2&password=pass
3payload3username=payload3&password=pass
4payload4username=payload4&password=pass
5payload5username=payload5&password=pass
6payload6username=payload6&password=pass

Request Volume Formula

$N$

Use Cases

  • Testing single parameter behavior
  • Username enumeration
  • Initial response pattern analysis

Operational Risk

Low (linear execution)


5.2 Battering Ram Attack

Purpose

Injects the same payload into multiple positions simultaneously.

Target Example

username=§user§&password=§password§

Payload Set (Single List)

payload1
payload2
payload3
payload4
payload5
payload6

Execution Model

RequestPayloadSent Request
1payload1username=payload1&password=payload1
2payload2username=payload2&password=payload2
3payload3username=payload3&password=payload3
4payload4username=payload4&password=payload4
5payload5username=payload5&password=payload5
6payload6username=payload6&password=payload6

Request Volume Formula

$N$

Use Cases

  • Testing identical credentials
  • Scenarios where parameters are expected to match

Operational Risk

Low


5.3 Pitchfork Attack

Purpose

Iterates through multiple payload sets in parallel (index-based).

Target Example

username=§user§&password=§password§

Payload Sets

Set 1

set1_item1
set1_item2
set1_item3

Set 2

set2_item1
set2_item2
set2_item3

Execution Model

Request1st payload2nd payloadSent Request
1set1_item1set2_item1username=set1_item1&password=set2_item1
2set1_item2set2_item2username=set1_item2&password=set2_item2
3set1_item3set2_item3username=set1_item3&password=set2_item3

Request Volume Formula

$\min(N_1, N_2, ..., N_n)$

Use Cases

  • Testing known username/password pairs
  • Validating parameter dependencies

Operational Risk

Moderate


5.4 Cluster Bomb Attack

Purpose

Tests all possible combinations across multiple payload sets (cartesian product).

Target Example

username=§user§&password=§password§

Payload Sets

Set 1

set1_item1
set1_item2
set1_item3

Set 2

set2_item1
set2_item2
set2_item3

Execution Model (Example)

Request1st payload2nd payloadSent Request
1set1_item1set2_item1username=set1_item1&password=set2_item1
2set1_item1set2_item2username=set1_item1&password=set2_item2
3set1_item1set2_item3username=set1_item1&password=set2_item3
4set1_item2set2_item1username=set1_item2&password=set2_item1
5set1_item2set2_item2username=set1_item2&password=set2_item2
6set1_item2set2_item3username=set1_item2&password=set2_item3

Request Volume Formula

$N1 \times N2$

Use Cases

  • Assessment of authentication control robustness

Operational Risk

High (exponential growth potential)