Breach attack simulation

shape