BREACH Attack
This document is for:
Invicti Standard, Invicti Enterprise On-Premises, Invicti Enterprise On-Demand
BREACH stands for ‘Browser Reconnaissance & Exfiltration via Adaptive Compression of Hypertext’. BREACH is a group of vulnerabilities of the same type, rather than a specific instance that impacts a particular piece of software. BREACH Attack detection is a security check that checks multiple criteria, including protected connections where attackers can still view the victim’s encrypted traffic.
This document explains how to enable BREACH Attack security checks for a scan policy in Invicti Enterprise and Invicti Standard.
How to enable BREACH Attack security checks in Invicti Enterprise
- Navigate to either an existing scan policy or create a new scan policy.
- Existing: Select Policies > Scan Policies from the left-side menu, then click Edit next to the relevant scan policy.
- New: Select Policies > New Scan Policy from the left-side menu.
- Select the Security Checks tab.
- Locate BREACH Attack in the list of Security Checks and click the checkbox to enable BREACH Attack security checks.
- Click Save at the bottom of the page.
How to enable BREACH Attack security checks in Invicti Standard
- From the Home tab, select Scan Policy Editor.
- Click New or select an existing custom scan policy (you cannot edit any of the pre-configured scan policies).
- Ensure Security Checks is selected in the left side, then locate BREACH Attack in the list of Security Check Groups and click the checkbox to enable BREACH Attack security checks.
- Click Apply, then OK to close the Scan Policy Editor window.