GET /api/techniques/117/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 117,
    "key": "iat-hooking",
    "unprotect_id": "U1217, F0015.003",
    "name": "IAT Hooking",
    "description": "IAT hooking is a way to run malicious code by modifying the Import Address Table of a specific executable. Consisting of  replacing one legitimate function from imported DLL by a malicious one. \r\n\r\nIAT hooking and inline hooking are generally known as userland rootkits. IAT hooking is a technique that malware uses to change the import address table. When a legitimate application calls an API located in a DLL, the replaced function is executed instead of the original one. In contrast, with inline hooking, malware modifies the API function itself.",
    "resources": "https://0x00sec.org/t/user-mode-rootkits-iat-and-inline-hooking/1108",
    "creation_date": "2019-03-23T17:28:15Z",
    "tags": "iat",
    "modification_date": "2023-10-04T10:42:26.592000Z",
    "category": [
        4
    ],
    "rules": [],
    "attachments": [],
    "featured_api": [
        7,
        249
    ],
    "contributors": []
}