Blog | G5 Cyber Security

Stopping BREACH Attacks

TL;DR

BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of HTTP) is an attack that steals data from HTTPS connections by exploiting compression. The main fixes are to disable HTTP/2 on servers, enable TLS 1.3, and use strong Content-Encoding negotiation.

What is BREACH?

BREACH exploits the way web servers compress HTTP responses. If a server compresses data before sending it, an attacker can try to inject requests into the compressed stream to reveal sensitive information like cookies or authentication tokens. It’s more effective on older TLS versions and when HTTP/2 is enabled.

How to Protect Against BREACH

  1. Disable HTTP/2
  • Enable TLS 1.3
  • Content-Encoding Negotiation
  • Regular Security Audits
  • Mitigation Summary

    The most effective way to prevent BREACH is a combination of disabling HTTP/2, enabling TLS 1.3, and carefully managing Content-Encoding negotiation. Regular security audits are also crucial.

    Exit mobile version