CARVIEW |
Select Language
HTTP/2 200
content-type: text/html; charset=utf-8
access-control-allow-origin: null
cache-control: public, must-revalidate, max-age=60
x-xss-protection: 1; mode=block
content-security-policy: default-src 'none';form-action 'self';base-uri 'none';child-src 'self' https://www.youtube.com/embed/ https://cheat-sheets.portswigger.net https://*.portswigger.com;connect-src 'self' https://ps.containers.piwik.pro https://ps.piwik.pro https://go.portswigger.net https://tags.srv.stackadapt.com https://www.google.com/recaptcha/ https://formsubmission.portswigger.net https://*.portswigger.com;font-src 'self' https://fonts.gstatic.com data:;frame-src 'self' https://*.portswigger.com/ https://portswigger.net/ https://cheat-sheets.portswigger.net https://www.youtube.com/embed/ https://www.google.com/recaptcha/;img-src 'self' https://*.portswigger.com/ https://portswigger.net/ https://i.ytimg.com/ https://tags.srv.stackadapt.com/sa.jpeg;script-src https://*.portswigger.com/ https://portswigger.net/ https://ps.containers.piwik.pro/ppms.js https://ps.piwik.pro/ppms.js https://www.youtube.com/iframe_api https://www.youtube.com/s/player/ https://tags.srv.stackadapt.com/events.js https://go.portswigger.net/pd.js 'nonce-8d3zBN915VVJXzupEUe8uh6yKAaqptln' 'strict-dynamic';style-src 'self' https://tags.srv.stackadapt.com/sa.css 'nonce-8d3zBN915VVJXzupEUe8uh6yKAaqptln' https://fonts.googleapis.com/css2* https://unpkg.com/animate.css@4.1.1/animate.css https://unpkg.com/@teleporthq/teleport-custom-scripts/dist/style.css;
date: Fri, 10 Oct 2025 20:02:45 GMT
server: '; DELETE carlos FROM users --
strict-transport-security: max-age=31536000; preload
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
x-hiring-now: We're on a mission to secure the web: https://portswigger.net/careers
x-robots-tag: all
content-encoding: gzip
vary: accept-encoding
x-cache: Miss from cloudfront
via: 1.1 d9551caede8715c1ee00c1d6508e1ffe.cloudfront.net (CloudFront)
x-amz-cf-pop: TLV55-P1
x-amz-cf-id: 9e4qFHWfbSTbeQ0nuVKM7m69SxxX97zjn3adxrBoYn4HYFV9oy7JWA==
Testing HTTP match and replace rules - PortSwigger
Research
Academy
My account
Customers
About
Blog
Careers
Legal
Contact
Resellers
Attack surface visibility
Improve security posture, prioritize manual testing, free up time.
CI-driven scanning
More proactive security - find and fix vulnerabilities earlier.
Application security testing
See how our software enables the world to secure the web.
DevSecOps
Catch critical bugs; ship more secure software, more quickly.
Penetration testing
Accelerate penetration testing - find more bugs, more quickly.
Automated scanning
Scale dynamic scanning. Reduce risk. Save time/money.
Bug bounty hunting
Level up your hacking and earn more bug bounties.
Compliance
Enhance security monitoring to comply with confidence.
View all solutions
Support Center
Get help and advice from our experts on all things Burp.
Documentation
Tutorials and guides for Burp Suite.
Get Started - Professional
Get started with Burp Suite Professional.
Get Started - Enterprise
Get started with Burp Suite Enterprise Edition.
User Forum
Get your questions answered in the User Forum.
Downloads
Download the latest version of Burp Suite.
Visit the Support Center
ProfessionalCommunity Edition
Testing HTTP match and replace rules
-
Last updated: October 1, 2025
-
Read time: 1 Minute
When adding or editing a HTTP match and replace rule, you can test your rule using the built-in test function. This enables you to confirm that the rule correctly matches and replaces the intended text.
To test a HTTP match and replace rule in the match/replace rule editor:
- Review the sample message under Original request or Original response. Optionally, replace this sample message with the specific request or response you'd like to test the rule against.
- Click Test. Burp applies the rule to the original message, creating a modified request or response.
- Review the modified request or response under Auto-modified request or Auto-modified response.
- Adjust the rule as necessary.
To restore the sample request or response, click .