Imo the databases are what's being manipulated. This can usually be done without fucking with the machine firmware or software. an example is a SQL injection. it all depends on what type of DB software is being used. you can usually connect to a DB without using the native software to make DB changes.