A lot of us, as hobbyists only used Burp Suite when we were diving into a CTF. Since that sort of use is timeboxed and we’re generally in a mad scramble to grab flags, we tend to ignore quality of life changes and learning the deeper configuration options.
Perhaps the most common example I see my peers dealing with is trash from the Firefox ‘success.txt’ messages, slack ping-pongs, and the mass amounts of google nonsense and noise while you’re using intruder.
In a meek attempt to save your sanity while forwarding 30 requests for every proxied request you may have done something dumb like using the interface options for ‘proxy/intercept/action/don’t intercept requests to this whatever`
When in truth, this actually just limits scope in your HTTP history.
This feature phenomenal on actual assessments when you need to verify reproducibility and provide careful documentation rather than aggressing through the challenge to try and get the flag.
A more advanced method of wasting your time is in resorting to the target/scope functionality itself. You may be confused when this illusion fades and you still find your intruder queue mired with garbage from across the intersphere.
Inside of Proxy/Options/Intercept Client Requests is a custom rulebox w/ several default options. The singular checked rule ‘And URL Is in target scope’ is what you need (After you’ve specified the scope)
DO THIS (TLDR):
This should spare you everthing except for websockets requests. Keep in mind that the default rule is a boolean ‘AND’, so you need to specify another rule first.
To deal with the websockets requests, drop to the line below and unselect the websockets selections.
Now you’ll be free to use Firefox both for your attack, and your CTF chat, or just updating your garbage blog instead of hacking boxes.