GET /api/techniques/136/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 136,
    "key": "ntfs-files-attributes",
    "unprotect_id": "U0501",
    "name": "NTFS Files Attributes",
    "description": "Every New Technology File System (NTFS) formatted partition contains a Master File Table (MFT) that maintains a record for every file/directory on the partition. Within MFT entries are file attributes, such as Extended Attributes and Data known as Alternate Data Streams (ADSs) when more than one Data attribute is present], that can be used to store arbitrary data (and even complete files. \r\n\r\nAdversaries may store malicious data or binaries in file attribute metadata instead of directly in files. This may be done to evade some defenses, such as static indicator scanning tools and anti-virus.",
    "resources": "https://blogs.technet.microsoft.com/askcore/2010/08/25/ntfs-file-attributes/",
    "creation_date": "2019-03-23T18:30:15Z",
    "tags": "ntfs",
    "modification_date": "2023-10-04T10:42:32.579000Z",
    "category": [
        2
    ],
    "rules": [],
    "attachments": [],
    "featured_api": [
        23,
        380,
        381,
        425,
        450
    ],
    "contributors": []
}