Apr 30, 2025 • PortSwigger Research
Using AI to find web app vulnerabilities: hacking expert John Hammond takes Burp AI for a spin
This article reviews the capabilities of Burp Suite's AI features, demonstrated by security researcher John Hammond. The content focuses on offensive security...
Executive Summary
This article reviews the capabilities of Burp Suite's AI features, demonstrated by security researcher John Hammond. The content focuses on offensive security tooling used by penetration testers to identify web application vulnerabilities more efficiently. Rather than detailing a specific cyberattack campaign, malware infection, or threat actor activity, the text highlights advancements in automated vulnerability scanning technology. Consequently, no specific threat actors or malware families are identified within this report. The severity is assessed as low because the subject matter pertains to legitimate security research and tool evaluation rather than active malicious operations. Organizations should view this as an indicator of evolving pentesting methodologies rather than a direct threat. Mitigation involves maintaining robust web application security postures to withstand both manual and AI-assisted vulnerability scanning efforts employed by adversaries or authorized testers.
Summary
1000s of pentesters are currently using Burp AI features to hack smarter by eliminating tedious tasks and delivering instant insights, right inside Burp Suite. Security Researcher John Hammond took Bu
Published Analysis
This article reviews the capabilities of Burp Suite's AI features, demonstrated by security researcher John Hammond. The content focuses on offensive security tooling used by penetration testers to identify web application vulnerabilities more efficiently. Rather than detailing a specific cyberattack campaign, malware infection, or threat actor activity, the text highlights advancements in automated vulnerability scanning technology. Consequently, no specific threat actors or malware families are identified within this report. The severity is assessed as low because the subject matter pertains to legitimate security research and tool evaluation rather than active malicious operations. Organizations should view this as an indicator of evolving pentesting methodologies rather than a direct threat. Mitigation involves maintaining robust web application security postures to withstand both manual and AI-assisted vulnerability scanning efforts employed by adversaries or authorized testers. 1000s of pentesters are currently using Burp AI features to hack smarter by eliminating tedious tasks and delivering instant insights, right inside Burp Suite. Security Researcher John Hammond took Bu 1000s of pentesters are currently using Burp AI features to hack smarter by eliminating tedious tasks and delivering instant insights, right inside Burp Suite. Security Researcher John Hammond took Bu