Exploiting e-mail systems
By nature, all the e-mail systems sit on the Internet and allow external anonymous access from the outside world in order to be productive. Users in many organizations send sensitive information over e-mail. In most environments, e-mail servers hold valuable information making them a high priority target for attackers. The good news for consumers is that correctly configured modern e-mail systems are extremely difficult to exploit. This does not mean e-mail systems are not vulnerable to attacks since most e-mail systems have web applications and are accessed through a web interface. This promotes the possibility of a remote attacker gaining access to a core system that could be leveraged as a jumping point to other internal ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access