Breach 5 User Manual


Getting Started

Installing Breach 5

Activating Breach 5

Using Breach 5

Connecting to a SecureGrid server

Performing an audit

Node Analysis

Countermeasure prevention

Disabling SecureGrid


Getting Started

Security experts agree: SecureGrid, the industry standard in network-based security software, is only secure when configured properly. Breach 5 serves to maximize security and build confidence in the system by identifying weaknesses in SecureGrid configurations through several methods and algorithms. Use Breach 5 to find holes in your SecureGrid before an attacker has the opportunity.

Breach 5 has a limited demo available. Below is a comparison of features:

FEATURE

DEMO

FULL VERSION

Simple, touch-based interface

Yes

Yes

Unlimited use

Yes

Yes

Countermeasure detection

No

Yes

Node Analysis

No

Yes

Remote auditing

No

Yes

Multicore support

No

Yes

Installing Breach 5

System Requirements

Breach 5 requires VigilOS 2.0 or later.

Installation

  1. Breach 5 is available as a VigilOS application package. Please contact our sales department at sales@getbreach.com to request a copy. You will be sent a demonstration version of the software that can be upgraded to the full version at any time.
  2. Save the .vapk file to your device.
  3. On your VigilOS device, open Settings. Click "Install App." A confirmation window will appear; click Yes to begin the installation.
  4. Once the application has been installed, click the Breach 5 icon on your App Grid.

Activating Breach 5

Breach 5 is available as a demo with limited features. To unlock the full version of Breach 5, click the Get Full Version button from within the program.

Using Breach 5

SecureGrid works by disallowing a client's access to a system unless the client transmits data via a series of nodes within SecureGrid. These nodes act as an authenticator for the client and an encryption layer for the data. No access is allowed the client sends and receives data via the correct and exact set of nodes.

For security reasons, the exact set of nodes is never saved on the system's device. Instead, one or more grid configurations are stored on the system, with each configuration storing general information about the node structure for verification and validation purposes.

Breach 5 operates by scanning SecureGrid systems' grid configurations to discover possible node locations and, if possible, reduce the number of invalid node sets. The Breach 5 user can then use this information to make educated guesses about which nodes in the SecureGrid system are valid.

Connecting to a SecureGrid server

To connect, click the Connect to Grid button and enter the IP address of a network device running SecureGrid.

Note: The demo version of Breach 5 is unable to connect to a remote server; the Connect to Grid button is replaced with a Launch Demo button.

Performing an audit

Once you have connected to a remote server (or launched the demo), Breach 5 will scan the system's SecureGrid to view the current grid configuration.

Numbers will be listed on the top and to the left of the grid configuration. These numbers indicate the exact number of valid nodes in a row or column. In the example above, the 0 numbers mean that there are no valid nodes on the top row, in the bottom row, or in the last column.

Using the numbers as a guide, use process of elimination to touch the valid nodes in the grid. Valid nodes appear in blue; invalid nodes appear in red. Completed node sets will appear in a brighter blue.

Node Analysis

Full versions of Breach 5 can use advanced predictive algorithms to identify the shape of node sets in a grid level. To perform an analysis, click the Run Node Scan button while auditing. Be warned: this process takes a few seconds.

Countermeasure prevention

Most modern versions of SecureGrid are set to reconfigure their node structures after a given interval. This interval is indicated by a yellow meter. Once the yellow meter runs out, the current security grid will be reset.

Most SecureGrid systems employ countermeasures that will terminate a connection if a number of invalid nodes are accessed. Full versions of Breach 5 can prevent connection terminations if the current grid level is higher than 1. It does so by storing the previous level's valid node structure in memory and reconfiguring it when countermeasures are detected. (The user will have to rediscover the new configuration of the previous level, but this is better than being kicked out completely.)

Disabling SecureGrid

Once all valid nodes of a grid level have been discovered, Breach 5 will use that level's node configuration to access the next level. Once all valid nodes for all grid levels have been discovered, Breach 5 will disable the SecureGrid system.

Note: Some SecureGrid systems may be configured to automatically re-enable after a period of time.

© Breach Incorporated. All Rights Reserved.