15
Enterprise Applications Security – Databases and Filesystems
In the previous chapter, we learned about very important protocols related to web applications, email services, and their corresponding loopholes and attacks. In this chapter, we will focus on more advanced topics, such as protocols required by databases and filesystems in a domain to store data that is required by application owners and users in an organization. If these protocols are misconfigured, it can open a backdoor for attackers.
Databases are a way of storing data in a structured way to insert, update, or delete it by making queries to the database. However, filesystems are a way of storing generic data in an unstructured way.
This chapter starts with an explanation of ...
Get Network Protocols for Security Professionals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.