Support
Scans

BREACH Attack

This document is for:
Invicti Standard, Invicti Enterprise On-Premises, Invicti Enterprise On-Demand

BREACH stands for ‘Browser Reconnaissance & Exfiltration via Adaptive Compression of Hypertext’. BREACH is a group of vulnerabilities of the same type, rather than a specific instance that impacts a particular piece of software. BREACH Attack detection is a security check that checks multiple criteria, including protected connections where attackers can still view the victim’s encrypted traffic.

This document explains how to enable BREACH Attack security checks for a scan policy in Invicti Enterprise and Invicti Standard.

How to enable BREACH Attack security checks in Invicti Enterprise

  1. Navigate to either an existing scan policy or create a new scan policy.
  • Existing: Select Policies > Scan Policies from the left-side menu, then click Edit next to the relevant scan policy.
  • New: Select Policies > New Scan Policy from the left-side menu.

  1. Select the Security Checks tab.

  1. Locate BREACH Attack in the list of Security Checks and click the checkbox to enable BREACH Attack security checks.

  1. Click Save at the bottom of the page.

How to enable BREACH Attack security checks in Invicti Standard

  1. From the Home tab, select Scan Policy Editor.

  1. Click New or select an existing custom scan policy (you cannot edit any of the pre-configured scan policies).

  1. Ensure Security Checks is selected in the left side, then locate BREACH Attack in the list of Security Check Groups and click the checkbox to enable BREACH Attack security checks.

  1. Click Apply, then OK to close the Scan Policy Editor window.