BREACH Attack
BREACH stands for ‘Browser Reconnaissance & Exfiltration via Adaptive Compression of Hypertext’. BREACH is a group of vulnerabilities of the same type, rather than a specific instance that impacts a particular piece of software. BREACH Attack detection is a security check that checks multiple criteria, including protected connections where attackers can still view the victim’s encrypted traffic.
This document explains how to enable BREACH Attack security checks for a scan policy.
How to enable BREACH Attack security checks
- Navigate to either an existing scan policy or create a new scan policy.
- Existing: Select Policies > Scan Policies from the left-side menu, then click Edit next to the relevant scan policy.
- New: Select Policies > New Scan Policy from the left-side menu.
- Select the Security Checks tab.
- Locate BREACH Attack in the list of Security Checks and click the checkbox to enable BREACH Attack security checks.
- Click Save at the bottom of the page.