GET /api/techniques/106/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"id": 106,
"key": "code-cave",
"unprotect_id": "U0502",
"name": "Code Cave",
"description": "A code cave is a series of null bytes in a process's memory. The code cave inside a process's memory is often a reference to a section of the code’s script functions that have capacity for the injection of custom instructions. For example, if a script’s memory allows for 5 bytes and only 3 bytes are used, then the remaining 2 bytes can be used to add external code to the script.",
"windows": "",
"linux": "",
"macos": "",
"resources": "https://resources.infosecinstitute.com/injecting-spyware-exe-code-injections/",
"creation_date": "2019-03-23T16:53:39Z",
"tags": "",
"modification_date": "2023-10-04T10:42:32.184000Z",
"category": [
2
],
"rules": [],
"attachments": [],
"featured_api": [],
"contributors": [
4,
5
]
}