Chapter 14
Communication and Messaging Systems
IN THIS CHAPTER
Attacking email systems
Assailing instant messaging
Assaulting Voice over IP applications
Communication systems and protocols such as email and Voice over Internet Protocol (VoIP) often create vulnerabilities that people overlook. Why? Well, in my experience, communications software — at both the server and client levels — is vulnerable because network administrators often believe that firewalls and antimalware software are all they need to keep trouble away, or they simply forget about securing these systems.
In this chapter, I show you how to test for common email and VoIP issues. I also outline key countermeasures to help prevent these hacks against your systems.
Introducing Messaging System Vulnerabilities
Practically all messaging applications are hacking targets on your network. Given the proliferation of and business dependence on email, just about anything is fair game. Ditto with VoIP. It’s downright scary what people with ill intent can do with these tools.
With messaging systems, one underlying weakness is that many of the supporting protocols weren’t designed with security in mind — especially those developed ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access