GET /api/techniques/37/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 37,
    "key": "connected-printer",
    "unprotect_id": "U1309, B0009.017",
    "name": "Connected Printer",
    "description": "Another technique for detecting if a program is running in a sandbox is to look for potential connected printers or identify the default Windows printers, Adobe, or OneNote. This is because sandboxes typically do not have access to printers, and detecting the absence of printers can help identify whether the program is being run in a sandbox environment.",
    "resources": "https://www.slideshare.net/bz98/sandbox-detection-leak-abuse-test-hacktivity-2015",
    "creation_date": "2019-03-11T08:18:47Z",
    "tags": "sandbox, program, printers, connected, default, Windows, Adobe, OneNote, access, environment, detection",
    "modification_date": "2023-10-04T10:42:15.569000Z",
    "category": [
        1
    ],
    "rules": [],
    "attachments": [],
    "featured_api": [
        40
    ],
    "contributors": []
}