87 words
1 minute
Disabling Automatic DNS Log Probing in Burp Suite

Burp Suite is a Java-based, cross-platform penetration testing tool for web applications. It is widely used for intercepting, modifying, and replaying HTTP requests, supporting features like packet capture, manual request tampering, and brute-force attacks. However, when Burp Suite starts, it actively initiates DNSLOG probing. These automated requests can be flagged as suspicious activity by security infrastructure like STA (Security Traffic Analysis) probes or IDS/IPS systems.

Alarm

Configuration Steps#

1、Burp -> Setting#

Burp Suite 1

2、Project -> Collaborator#

Change the setting from “Use the default Collaborator server” to “Don’t use Burp Collaborator”.

Burp Suite 2

Disabling Automatic DNS Log Probing in Burp Suite
https://fuwari.vercel.app/posts/57a913c1-cd81-481d-a278-f72a12fa547c/
Author
Ryan Zhang
Published at
2025-06-27
License
CC BY-NC-SA 4.0
This content has been translated with the assistance of AI tools, including ChatGPT, Gemini, and Qwen. While efforts have been made to ensure accuracy and clarity, minor discrepancies may exist. Please refer to the original text for authoritative interpretation if needed.