Chapter 14
Communication and Messaging Systems
IN THIS CHAPTER
Attacking email systems
Assailing instant messaging
Assaulting Voice over IP applications
Communication systems and protocols such as email and Voice over Internet Protocol (VoIP) often create vulnerabilities that people overlook. Why? Well, in my experience, communications software — at both the server and client levels — is vulnerable because network administrators often believe that firewalls and antimalware software are all they need to keep trouble away, or they simply forget about securing these systems.
In this chapter, I show you how to test for common email and VoIP issues. I also outline key countermeasures to help prevent these hacks against your systems.
Introducing Messaging System Vulnerabilities
Practically all messaging applications are hacking targets on your network. Given the proliferation of and business dependence on email, just about anything is fair game. Ditto with VoIP. It’s downright scary what people with ill intent can do with these tools.
With messaging systems, one underlying weakness is that many of the supporting protocols weren’t designed with security in mind — especially those developed ...
Get Hacking For Dummies, 7th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.