Part V
Hacking Applications
In this part . . .
Well, this book has covered everything from nontechnical hacks to network and mobile hacks to operating system hacks. What I havenât yet covered are the applications that run on top of all this, database servers, and the storage systems that ensure the data is available when we need it.
The first chapter in this part covers various messaging hacks and countermeasures affecting e-mail and Voice over IP (VoIP) systems. Next, this part looks at web exploits, along with some countermeasures to secure websites and applications from the elements. Finally, this part covers attacks against database servers and storage systems. It covers both structured data found in various database systems and unstructured data, otherwise known as network files.