GET /api/techniques/141/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 141,
    "key": "dns-hijacking",
    "unprotect_id": "U0904, E1643.m01",
    "name": "DNS Hijacking",
    "description": "DNS hijacking or DNS redirection is a technique used to subvert the normal domain name resolution process. It involves redirecting DNS queries to a rogue DNS server controlled by an attacker, or modifying the behavior of a trusted DNS server so that it does not comply with internet standards. This can be done for various purposes, such as phishing attacks, censorship, or for the self-serving purposes of internet service providers (ISPs) and DNS service providers.\r\n\r\nDNS hijacking can be carried out by malware that modifies a computer's TCP/IP configuration to point to a rogue DNS server. This allows the attacker to redirect the user's internet traffic to malicious websites or to block access to certain websites. It can also be used by ISPs and DNS service providers to redirect users to their own web servers for advertising or other purposes.",
    "resources": "https://en.wikipedia.org/wiki/DNS_hijacking",
    "creation_date": "2019-04-23T12:20:47Z",
    "tags": "DNS hijacking,\r\nDNS redirection,\r\nDomain name system (DNS),\r\nRogue DNS server,\r\nTrusted DNS server,",
    "modification_date": "2023-10-04T10:44:26.656000Z",
    "category": [
        9
    ],
    "rules": [],
    "attachments": [],
    "featured_api": [],
    "contributors": []
}