GET /api/techniques/72/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 72,
    "key": "performing-code-checksum",
    "unprotect_id": "U0107",
    "name": "Performing Code Checksum",
    "description": "Adversaries may use code checksumming to detect if their code has been modified or tampered with. This technique involves calculating a checksum or hash of the code, storing it, and then periodically checking the current checksum against the stored one. If the checksums do not match, it indicates that the code has been modified and the adversary's code can take appropriate action, such as exiting or altering its behavior. \r\n\r\nThis technique can be used to detect if anti-debugging routines have been disabled or if the code has been tampered with in other ways. By detecting these modifications, the adversary's code can attempt to evade detection and make reverse engineering more difficult.",
    "resources": "https://www.apriorit.com/dev-blog/367-anti-reverse-engineering-protection-techniques-to-use-before-releasing-software",
    "creation_date": "2019-03-18T13:42:45Z",
    "tags": "",
    "modification_date": "2023-10-04T10:43:00.625000Z",
    "category": [
        3
    ],
    "rules": [],
    "attachments": [],
    "featured_api": [],
    "contributors": []
}