Breach 5 User Manual
Connecting to a SecureGrid server
Security experts agree: SecureGrid, the industry standard in network-based security software, is only secure when configured properly. Breach 5 serves to maximize security and build confidence in the system by identifying weaknesses in SecureGrid configurations through several methods and algorithms. Use Breach 5 to find holes in your SecureGrid before an attacker has the opportunity.
Breach 5 has a limited demo available. Below is a comparison of features:
FEATURE | DEMO | FULL VERSION |
Simple, touch-based interface | Yes | Yes |
Unlimited use | Yes | Yes |
Countermeasure detection | No | Yes |
Node Analysis | No | Yes |
Remote auditing | No | Yes |
Multicore support | No | Yes |
System Requirements
Breach 5 requires VigilOS 2.0 or later.
Installation
Breach 5 is available as a demo with limited features. To unlock the full version of Breach 5, click the Get Full Version button from within the program.
SecureGrid works by disallowing a client's access to a system unless the client transmits data via a series of nodes within SecureGrid. These nodes act as an authenticator for the client and an encryption layer for the data. No access is allowed the client sends and receives data via the correct and exact set of nodes.
For security reasons, the exact set of nodes is never saved on the system's device. Instead, one or more grid configurations are stored on the system, with each configuration storing general information about the node structure for verification and validation purposes.
Breach 5 operates by scanning SecureGrid systems' grid configurations to discover possible node locations and, if possible, reduce the number of invalid node sets. The Breach 5 user can then use this information to make educated guesses about which nodes in the SecureGrid system are valid.
To connect, click the Connect to Grid button and enter the IP address of a network device running SecureGrid.
Note: The demo version of Breach 5 is unable to connect to a remote server; the Connect to Grid button is replaced with a Launch Demo button.
Once you have connected to a remote server (or launched the demo), Breach 5 will scan the system's SecureGrid to view the current grid configuration.
Numbers will be listed on the top and to the left of the grid configuration. These numbers indicate the exact number of valid nodes in a row or column. In the example above, the 0 numbers mean that there are no valid nodes on the top row, in the bottom row, or in the last column.
Using the numbers as a guide, use process of elimination to touch the valid nodes in the grid. Valid nodes appear in blue; invalid nodes appear in red. Completed node sets will appear in a brighter blue.
Full versions of Breach 5 can use advanced predictive algorithms to identify the shape of node sets in a grid level. To perform an analysis, click the Run Node Scan button while auditing. Be warned: this process takes a few seconds.
Most modern versions of SecureGrid are set to reconfigure their node structures after a given interval. This interval is indicated by a yellow meter. Once the yellow meter runs out, the current security grid will be reset.
Most SecureGrid systems employ countermeasures that will terminate a connection if a number of invalid nodes are accessed. Full versions of Breach 5 can prevent connection terminations if the current grid level is higher than 1. It does so by storing the previous level's valid node structure in memory and reconfiguring it when countermeasures are detected. (The user will have to rediscover the new configuration of the previous level, but this is better than being kicked out completely.)
Once all valid nodes of a grid level have been discovered, Breach 5 will use that level's node configuration to access the next level. Once all valid nodes for all grid levels have been discovered, Breach 5 will disable the SecureGrid system.
Note: Some SecureGrid systems may be configured to automatically re-enable after a period of time.
© Breach Incorporated. All Rights Reserved.