CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=utf-8
access-control-allow-origin: null
cache-control: public, must-revalidate, max-age=60
x-xss-protection: 1; mode=block
content-security-policy: default-src 'none';form-action 'self';base-uri 'none';child-src 'self' https://www.youtube.com/embed/ https://cheat-sheets.portswigger.net https://*.portswigger.com;connect-src 'self' https://ps.containers.piwik.pro https://ps.piwik.pro https://go.portswigger.net https://tags.srv.stackadapt.com https://www.google.com/recaptcha/ https://formsubmission.portswigger.net https://*.portswigger.com;font-src 'self' https://fonts.gstatic.com data:;frame-src 'self' https://*.portswigger.com/ https://portswigger.net/ https://cheat-sheets.portswigger.net https://www.youtube.com/embed/ https://www.google.com/recaptcha/;img-src 'self' https://*.portswigger.com/ https://portswigger.net/ https://i.ytimg.com/ https://tags.srv.stackadapt.com/sa.jpeg;script-src https://*.portswigger.com/ https://portswigger.net/ https://ps.containers.piwik.pro/ppms.js https://ps.piwik.pro/ppms.js https://www.youtube.com/iframe_api https://www.youtube.com/s/player/ https://tags.srv.stackadapt.com/events.js https://go.portswigger.net/pd.js 'nonce-FmDh/Ey2Lo5cvVRURdkRt3m4WNny1aKc' 'strict-dynamic';style-src 'self' https://tags.srv.stackadapt.com/sa.css 'nonce-FmDh/Ey2Lo5cvVRURdkRt3m4WNny1aKc' https://fonts.googleapis.com/css2* https://unpkg.com/animate.css@4.1.1/animate.css https://unpkg.com/@teleporthq/teleport-custom-scripts/dist/style.css;
date: Sat, 11 Oct 2025 00:37:06 GMT
server: '; DELETE carlos FROM users --
strict-transport-security: max-age=31536000; preload
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-hiring-now: We're on a mission to secure the web: https://portswigger.net/careers
x-robots-tag: all
content-encoding: gzip
vary: accept-encoding
x-cache: Miss from cloudfront
via: 1.1 0521b7c7fa2bab7f39e181f5010ba776.cloudfront.net (CloudFront)
x-amz-cf-pop: TLV55-P1
x-amz-cf-id: SGMTiv1m23IKkN7cGFbtQCOKiIyMq3CUBgHZEiKx0imPt6YKvHULow==
Discovering hidden content with Burp Suite - PortSwigger
Research
Academy
My account
Customers
About
Blog
Careers
Legal
Contact
Resellers
Attack surface visibility
Improve security posture, prioritize manual testing, free up time.
CI-driven scanning
More proactive security - find and fix vulnerabilities earlier.
Application security testing
See how our software enables the world to secure the web.
DevSecOps
Catch critical bugs; ship more secure software, more quickly.
Penetration testing
Accelerate penetration testing - find more bugs, more quickly.
Automated scanning
Scale dynamic scanning. Reduce risk. Save time/money.
Bug bounty hunting
Level up your hacking and earn more bug bounties.
Compliance
Enhance security monitoring to comply with confidence.
View all solutions
Support Center
Get help and advice from our experts on all things Burp.
Documentation
Tutorials and guides for Burp Suite.
Get Started - Professional
Get started with Burp Suite Professional.
Get Started - Enterprise
Get started with Burp Suite Enterprise Edition.
User Forum
Get your questions answered in the User Forum.
Downloads
Download the latest version of Burp Suite.
Visit the Support Center
- Support Center
- Documentation
- Desktop editions
- Testing workflow
- Mapping the website
- Discovering hidden content
ProfessionalCommunity Edition
Discovering hidden content with Burp Suite
-
Last updated: October 1, 2025
-
Read time: 1 Minute
Applications often contain locations that you can't browse to, as they are not directly linked from visible content. Some examples of hidden content include:
- Functionality that has been used for testing, but hasn't been removed.
- New functionality that has been added to the server, but hasn't been linked from the main application.
- Internal-only functionality that isn't linked from the main application.
- Features that your account doesn't have permission to use.
Burp includes a range of tools that can help you discover hidden content. This enables you to build a more comprehensive map of the target application and identify a wider attack surface.