Burp Suite User Forum

Create new post

Scanning error

V | Last updated: Jun 08, 2022 12:22PM UTC

As i tried to scan the URL scan got aborted with following error 1654690424690 Info Task 11 Paused due to error: Could not connect to any seed URLs. 1654690423985 Info Task 11 Crawl started. 1654690242653 Debug Task 10 Did not find a registration form when i tried to access the URL same is accessible

Michelle, PortSwigger Agent | Last updated: Jun 08, 2022 02:55PM UTC

Thanks for your message. When you were able to access the site successfully, were you using Burp's embedded browser, or were you using another browser (not proxied via Burp) from the same machine? Do you use an upstream proxy server?

加山 | Last updated: Jun 06, 2023 06:33AM UTC

Hello Previous versions of Burp Pro could scan long URLs, After updating to Burp Pro 2023.4.5, the following error is displayed when scanning a long URL. Please let me know what is wrong. I am not using proxy. [Error]  Paused task due to: Could not connect to any seed URLs. [URL] http://111.111.111.111/dvwa/vulnerabilities/xss_r/ -> Error http://111.111.111.111/dvwa/vulnerabilities/ -> no error Thank you.

Michelle, PortSwigger Agent | Last updated: Jun 06, 2023 12:41PM UTC

Hi When you test access to the site outside the scan, have you logged in via your browser? When you set up your scan task, are you including the details to allow the scan to log into the site? If you start the site scan from the login page, can you reach the URLs?

加山 | Last updated: Jun 07, 2023 12:52AM UTC

Thanks for the reply. Sorry for the lack of information. When I run the scan I select the scan type, but the scan type selection causes an error. [Scan Type]  Scan Type: Crawland audit -> Error  Scan Type: Audit selected items -> No Error [URL] http://111.111.111.111/dvwa/vulnerabilities/xss_r/ [Error]  Paused task due to: Could not connect to any seed URLs. - We have confirmed that the login screen is displayed via the browser. - Session Handling Rules are set. When the session expires, we use the user_token issued on the login page to log in and maintain the session. - The scan is executed and ends normally.  http://111.111.111.111/dvwa/login.php Regards,

Michelle, PortSwigger Agent | Last updated: Jun 07, 2023 08:06AM UTC

Hi Thanks for the update. The URL specified as the starting point for the scan (http://111.111.111.111/dvwa/vulnerabilities/xss_r/) requires a user to be logged in t be able to access the location. Have you added the login credentials for the site to the scan task?

加山 | Last updated: Jun 08, 2023 12:28AM UTC

Hello Thank you for your reply. When creating a new scan task, I set the ID and password in the application login settings and started scanning, but the same error occurred. - New Scan settings Scan details Scan Type: Crawl and audit Application login Use login credentials (username & password) [Error]  Paused task due to: Could not connect to any seed URLs. Regards,

加山 | Last updated: Jun 08, 2023 05:08AM UTC

Hi It will be additional information. I checked the Logger of the scan task. - Scan Type: Crawl and audit cases Redirected to login.php with HTTP status code 302, and finished with only 2 requests. - Scan Type: Audit case Macros set in Session Handling Rules are running. You can see the behavior of logging in again to maintain the session.

Michelle, PortSwigger Agent | Last updated: Jun 08, 2023 12:12PM UTC

Hi Is there a particular reason behind wanting to start the scan from http://111.111.111.111/dvwa/vulnerabilities/xss_r/? If you scan the site setting a different IRL as the URL to scan, do you see the same issue? Can you please email screenshots of the details you are entering in each scan setup tab to support@portswigger.net so we can take a closer look for you?

加山 | Last updated: Jun 09, 2023 07:23AM UTC

Hi - Scanning the entire site takes a considerable amount of time, so we want to shorten the time by scanning any URL. - I get the same problem when I scan the site with other URLs.  http://111.111.111.111/dvwa/vulnerabilities/xss_s/  http://111.111.111.111/dvwa/vulnerabilities/exec/  http://111.111.111.111/dvwa/vulnerabilities/sqli/ - thank you. We will send the screenshot to your specified email address. Regards,

Michelle, PortSwigger Agent | Last updated: Jun 09, 2023 09:09AM UTC

Hi We've received your email with the screenshots. We'll take a look and be in touch soon.

You must be an existing, logged-in customer to reply to a thread. Please email us for additional support.