GET /api/techniques/152/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 152,
    "key": "bypass-user-account-control",
    "unprotect_id": "T1548.002",
    "name": "Bypass User Account Control",
    "description": "Adversaries may bypass UAC mechanisms to elevate process privileges on system.  Windows User Account Control (UAC) allows a program to elevate its privileges (tracked as integrity levels ranging from low to high) to perform a task under administrator-level permissions, possibly by prompting the user for confirmation.\r\n\r\nThe impact to the user ranges from denying the operation under high enforcement to allowing the user to perform the action if they are in the local administrators group and click through the prompt or allowing them to enter an administrator password to complete the action.",
    "resources": "https://attack.mitre.org/techniques/T1548/002/",
    "creation_date": "2020-10-05T06:30:46Z",
    "tags": "Defense Evasion,\r\nbypass UAC controls,\r\nMITRE,\r\nprivilege elevation,",
    "modification_date": "2023-10-04T10:44:59.068000Z",
    "category": [
        10
    ],
    "rules": [
        24,
        38
    ],
    "attachments": [],
    "featured_api": [
        25
    ],
    "contributors": []
}