1. The document discusses RESTful APIs and gRPC, comparing their characteristics and use cases.
2. RESTful APIs typically use HTTP and JSON to access resources via URLs while gRPC uses protocol buffers and HTTP/2 for efficient streaming and RPC.
3. gRPC is better suited for microservices and mobile apps due to its ability to handle streaming and performance, while REST is more widely used due to its simplicity and support in most languages.
1. The document discusses RESTful APIs and gRPC, comparing their characteristics and use cases.
2. RESTful APIs typically use HTTP and JSON to access resources via URLs while gRPC uses protocol buffers and HTTP/2 for efficient streaming and RPC.
3. gRPC is better suited for microservices and mobile apps due to its ability to handle streaming and performance, while REST is more widely used due to its simplicity and support in most languages.
This document discusses techniques for bypassing antivirus software using PowerShell. It describes Empire, a post-exploitation framework that allows attackers to execute scripts on victim machines using PowerShell or Python. These scripts regularly connect to a C2 server using HTTP/HTTPS. It then focuses on how Empire's PowerShell scripts can bypass detection through obfuscation techniques like using alternative casing, escape characters, and encoding files in base64. Custom Invoke-Mimikatz scripts can execute any EXE file in memory, making detection difficult for antivirus software. Limiting PowerShell access and monitoring execution logs are recommended defenses.
1) The document discusses ways that security functions on Windows can potentially be bypassed during a penetration test, such as restricting access to drives, applications, and Internet Explorer.
2) Methods are presented for bypassing application restrictions, such as using HTML help to access the internet without a browser or using InstallUtil to execute PowerShell without PowerShell.
3) Countermeasures are suggested like using AppLocker with a whitelist and monitoring logs to prevent bypassing security restrictions.
Nmap has several hidden options that provide little value. 8 options are useless except for naughty users or elementary school children. Nmap can only detect one type of malware, the Mydoom worm, through service scanning at high intensity levels. In summary, most of the "hidden truths" about Nmap options provide little practical benefit to users.