Enterprise Applications Security – Databases and Filesystems
In the previous chapter, we learned about very important protocols related to web applications, email services, and their corresponding loopholes and attacks. In this chapter, we will focus on more advanced topics, such as protocols required by databases and filesystems in a domain to store data that is required by application owners and users in an organization. If these protocols are misconfigured, it can open a backdoor for attackers.
Databases are a way of storing data in a structured way to insert, update, or delete it by making queries to the database. However, filesystems are a way of storing generic data in an unstructured way.
This chapter starts with an explanation of the Microsoft network and database protocols, how these protocols work, various loopholes, and the countermeasures that can be implemented to secure these protocols from various attacks.
In this chapter, we will cover the following...