GET /api/techniques/142/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 142,
    "key": "tor-network-c2",
    "unprotect_id": "U0903",
    "name": "Tor Network C2",
    "description": "Tor is a free and open-source network that enables anonymous communication. It uses a network of volunteer-operated servers, known as \"relays,\" to route internet traffic in a way that conceals the user's location and usage from surveillance and traffic analysis. By routing traffic through multiple relays, Tor makes it difficult to trace internet activity back to the user.\r\n\r\nMalware can use the Tor network to communicate with a command and control (C&C) server in a way that is harder to detect. Ransomware often uses Tor to host the payment page and even data leak pages. By using the anonymity provided by Tor, the attackers can make it more difficult for authorities to track them down and shut down their operations.",
    "resources": "",
    "creation_date": "2019-04-23T12:25:04Z",
    "tags": "Tor,\r\nAnonymous communication,\r\nInternet traffic,\r\nVolunteer overlay network,\r\nCommand and control (C&C),",
    "modification_date": "2023-10-04T10:39:37.409000Z",
    "category": [
        9
    ],
    "rules": [],
    "attachments": [],
    "featured_api": [],
    "contributors": []
}