VulnerabilityScanPro
All articles
// TOOLING

Reading a Burp Suite output: a 30-minute primer

Burp's Issue panel is dense and full of false positives. Most engineers skim past it. Here's how to triage the output efficiently — and which categories almost always need manual confirmation.

Vulnerabilityscanpro admin
Vulnerabilityscanpro admin
Mar 21, 2026 5 min read
Reading a Burp Suite output: a 30-minute primer

The categories you can act on directly

  • High-severity confirmed — verified by Burp, near-zero false positive rate
  • TLS / cert issues — usually accurate; double-check on SSL Labs
  • Header issues — missing security headers, easy to confirm with curl

The categories that are noisy

  • Reflected XSS — Burp false-positives constantly. Always reproduce manually before believing.
  • SQL injection (time-based) — load on the DB, network jitter, or rate-limiting can produce false positives. Confirm with a payload that returns specific data.
  • Open redirects — many legitimate redirect endpoints are flagged. Check whether the destination is attacker-controlled.
  • CSRF on state-changing forms — Burp doesn't always understand SameSite cookies. Verify the actual request origin policy.

The categories Burp is bad at

  • BOLA / IDOR — Burp doesn't know your auth model
  • Race conditions — needs the Turbo Intruder or manual scripting
  • Logic flaws — out of scope for any automated scanner

Our triage flow

  1. Filter Burp's issues by severity
  2. For each High and Critical, manually reproduce before logging
  3. For Mediums, batch-review in 15 minutes per category
  4. Lows go into the report as observations, not findings
  5. Combine with the Nessus + ZAP output, dedupe, then start manual hunting

This pass takes about half a day for a typical web app. The remaining 4–5 days of the engagement are pure manual review — and that's where the real value lives.


// tags: #burp suite #tools #reference