BREACH Attack
What is BREACH Attack?
BREACH AttackA 2013 side-channel attack that recovers HTTPS-protected secrets by exploiting HTTP-level compression and observing response sizes across attacker-influenced requests.
BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) was disclosed at Black Hat USA 2013 by Gluck, Harris, and Prado. It targets web applications that gzip-compress HTTP responses containing both attacker-controlled input and a secret such as a CSRF token. By injecting guess strings and measuring the length of encrypted responses, the attacker performs a byte-by-byte compression-ratio oracle even when TLS itself is sound. Unlike CRIME, BREACH attacks HTTP body compression, so disabling TLS compression does not mitigate it. Defences include separating secrets from compressed bodies, masking tokens per request, rate limiting, length randomization, and CSRF-token rotation.
● Examples
- 01
Extracting an anti-CSRF token from a Gmail-style page that reflects user input alongside the token.
- 02
Recovering OAuth state values from a compressed HTTPS response.
● Frequently asked questions
What is BREACH Attack?
A 2013 side-channel attack that recovers HTTPS-protected secrets by exploiting HTTP-level compression and observing response sizes across attacker-influenced requests. It belongs to the Attacks & Threats category of cybersecurity.
What does BREACH Attack mean?
A 2013 side-channel attack that recovers HTTPS-protected secrets by exploiting HTTP-level compression and observing response sizes across attacker-influenced requests.
How does BREACH Attack work?
BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) was disclosed at Black Hat USA 2013 by Gluck, Harris, and Prado. It targets web applications that gzip-compress HTTP responses containing both attacker-controlled input and a secret such as a CSRF token. By injecting guess strings and measuring the length of encrypted responses, the attacker performs a byte-by-byte compression-ratio oracle even when TLS itself is sound. Unlike CRIME, BREACH attacks HTTP body compression, so disabling TLS compression does not mitigate it. Defences include separating secrets from compressed bodies, masking tokens per request, rate limiting, length randomization, and CSRF-token rotation.
How do you defend against BREACH Attack?
Defences for BREACH Attack typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for BREACH Attack?
Common alternative names include: BREACH, HTTP compression side channel.
● Related terms
- attacks№ 235
CRIME Attack
A 2012 side-channel attack by Rizzo and Duong that recovers HTTPS session cookies by exploiting TLS-level compression and observing ciphertext lengths.
- vulnerabilities№ 1038
Side-Channel Attack
An attack that recovers secrets from a system by observing physical or implementation characteristics — timing, power, electromagnetic emissions, caches, acoustic signals — rather than logical flaws.
- network-security№ 1159
TLS (Transport Layer Security)
The IETF-standardized cryptographic protocol that provides confidentiality, integrity, and authentication for traffic between two networked applications.
- attacks№ 786
Padding Oracle Attack
A cryptographic attack (Vaudenay 2002) that decrypts CBC ciphertext when a server reveals whether a tampered message has correct PKCS#7 padding.