logo svg
logo

December 31, 2025

What Is Living Off the Land Binaries (LOLBins) in Cybersecurity?

How attackers abuse trusted system tools for stealthy, fileless attacks

Mohammed Khalil

Mohammed Khalil

Featured Image

Living off the land binaries (LOLBins) are genuine operating system executables that adversaries exploit for malicious purposes. In plain terms, a LOLBin is any binary or tool that comes with the OS or is commonly installed which can be repurposed during an attack to help the attacker achieve their goals. Because these programs e.g. PowerShell, rundll32, msiexec exist on the system before the attack, they’re usually trusted by users and security software. Attackers live off the land by using what’s already there instead of introducing new malware. This tactic drastically reduces the chance of detection after all, if malware can disguise its activity as a normal OS process, security tools are less likely to raise an alarm.

(LOLBins) matter today because they are prevalent in modern cyber attacks. Many high profile breaches and advanced persistent threats have involved attackers abusing native tools rather than deploying obvious malware. In fact, over one third of Red Canary’s detections in 2022 involved LOLBin usage, illustrating how common this technique has become. Threat actors from financially motivated groups to nation state APTs leverage (LOLBins) across environments on premises, cloud, and hybrid networks to maintain persistence and move covertly. By using built in binaries often even Microsoft signed, attackers bypass application whitelisting and signature based defenses. This makes (LOLBins) a significant concern for defenders, as traditional anti virus may see nothing amiss when a known good tool is doing something bad.

How Living Off The Land Binaries Works

(LOLBins) enable attackers to perform malicious actions through legitimate channels. Here’s how a typical LOLBin assisted attack might unfold:

  1. Initial Access & Execution: After gaining an initial foothold, say via a phishing email or exploit, the attacker invokes a pre-installed binary to run malicious code. For example, a malicious Office macro might call the Windows Installer msiexec.exe to silently download and execute a payload. No new malware file is saved to disk, instead, a trusted OS program carries out the download and execution, instantly making the attack look like normal installer activity.
  2. Abusing Legitimate Functions: The attacker then chains or scripts native utilities to expand their control. Any tool that can download files, execute commands, or modify the system is a candidate LOLBin. For instance, the certutil utility intended for certificate management can be misused to fetch and decode malicious data from the internet. An attacker might host a base64 encoded malicious payload on a remote server and use certutil -urlcache -split to download it and certutil -decode to reconstruct the malware locally all under the guise of normal admin operations. Similarly, scripting engines wscript, cscript, or PowerShell and other tools like regsvr32, mshta are leveraged to execute attacker supplied scripts or DLLs, but launched by trusted binaries.
  3. Persistence & Lateral Movement: Beyond initial code execution, attackers abuse system binaries to maintain persistence and spread. They might use scheduled task utilities schtasks.exe or WMI Windows Management Instrumentation to establish backdoors that run at boot or on schedule again using native scheduler or management tools. For lateral movement, adversaries can use administrative utilities like wmic.exe or SMB tools to execute commands on other machines, which are similar lateral movement methods built into the OS. Because these actions originate from standard administration binaries, they often appear legitimate. In effect, (LOLBins) allow attackers to propagate through a network using the operating system’s own functionality as the vehicle.
  4. Stealth and Cleanup: Throughout the attack, the use of (LOLBins) confers stealth. Since the activity is executed by standard programs often running from typical system paths and signed by the OS vendor, many security controls won’t flag them by default. The approach is frequently fileless, meaning malicious code runs in memory or via system tools without a unique malicious executable on disk. This leaves few traditional IOCs indicators of compromise, no suspicious .exe to hash or quarantine. Attackers may also use (LOLBins) for cleanup, e.g. using powershell.exe to delete logs or using wbadmin.exe a backup tool to copy out data. By the end, if the system reboots or clears memory, little forensic evidence might remain. The entire chain of events can appear as a series of benign operations performed by legitimate programs, making the compromise hard to spot in hindsight.

In summary, (LOLBins) work by hijacking the normal capabilities of system tools, downloading files, running scripts, compiling code, editing the registry, etc. for nefarious ends. The operating system essentially becomes the attacker’s toolkit. Every step that would typically require a custom hacking tool instead uses a built-in binary: the attackers live off the land provided by the victim’s environment.

Real World Examples

Attack Scenario 1 Malware Delivery via msiexec: A notorious cybercrime group TA505 leveraged (LOLBins) in a phishing campaign to deliver malware. In one case, they sent a malicious Excel document to victims. When opened, the Excel macro didn’t drop malware directly, instead, it launched the legitimate Windows Installer msiexec.exe as a LOLBin. The macro instructed msiexec to connect to the attacker’s server and download the first stage payload, all under the Installer’s process. Because msiexec is a trusted OS component for installing software, this activity helped the attack fly under the radar of security tools. The group effectively used a normal Windows binary to pull in malware, bypassing application controls and letting the malicious code run as if it were a legitimate installation process.

Attack Scenario 2 Credential Dumping with rundll32: Attackers also abuse (LOLBins) for credential theft. For example, the Windows rundll32.exe program which is meant to run DLL functions can be pointed at Windows’ own system DLLs to perform unintended actions. Security researchers have observed malware using rundll32 to invoke a function in the system file comsvcs.dll that dumps the memory of the LSASS process which holds user credentials. In this way, credentials are extracted using a built-in tool , a credential theft technique that doesn’t require external hacking utilities. Similarly, malware families like Emotet and Qbot have used rundll32 to execute malicious DLLs loaded from odd locations like from the user’s Temp directory or masquerading as a .jpg file. The use of a standard binary to launch these payloads helps the malware blend in, since rundll32.exe running is not unusual on Windows, only its command line parameters or behavior might give away the malicious activity.

Attack Scenario 3 Living off the Land for Persistence: Another common use of (LOLBins) is establishing persistence on a compromised host. For instance, an attacker might create a scheduled task or service that runs at startup by using schtasks.exe or sc.exe Service Control. These tools are intended for administrators to schedule maintenance or manage services, but threat actors abuse them to make their malware run automatically. In one real case, attackers with access to a system ran such tasks to schedule a daily execution of a PowerShell script that beaconed out to their server. Because scheduled tasks are a normal admin mechanism, this persistence method is less likely to trigger alarms. Likewise, wmic.exe Windows Management Instrumentation Command line has been used to execute commands on remote systems in the network as part of lateral movement again, appearing as standard IT operations. Such use of administrative (LOLBins) can allow attackers to expand and persist inside networks while appearing to be routine sysadmin activity.

Legitimate Use vs Abuse: It’s important to note that all the above binaries have legitimate daily uses. Administrators legitimately use certutil to manage certificates, msiexec to install software, net.exe to manage user accounts, etc. In fact, as an example, many admins use the net.exe utility to add or remove user accounts as part of IT maintenance threat actors do the same to stealthily create backdoor accounts. The presence of these tools and even their occasional execution is normal, what stands out in attacks is how they’re used. For instance, net.exe being run to add an unexpected administrator account, or run from a suspicious parent process like an Office macro, would be a red flag. Understanding the context of execution is key. In real enterprise networks, (LOLBins) are running all the time for legitimate reasons which is exactly why attackers abuse them, knowing that a user or security team may not immediately suspect malicious intent when they see a known good program running.

Why Living Off The Land Binaries Is Important

Stealth and Evasion: (LOLBins) are a big deal because they grant attackers near invisibility. Every defender’s nightmare is an attacker who operates using only what’s already on the system. By using native binaries, attackers wear a disguise of legitimacy. Security products that rely on blacklists or known malware signatures often fail to detect these intrusions. The day to day commonality of these binaries serves as a cloak of invisibility for the attacker. Activity that would otherwise scream malicious like dumping credentials or downloading payloads looks like normal OS behavior. This inherent stealth is why threat actors from nation state groups to ransomware gangs heavily favor (LOLBins) it lets them evade antivirus and whitelisting policies by piggybacking on trusted processes. Traditional security tools may not flag, say, powershell.exe making a network connection if PowerShell is commonly used in that environment.

Impact on Detection and Response: The rise of LOLBin techniques has forced a shift in how we do defense. There is often no malware file to quarantine or hash the malicious activity lives in legitimate process executions and memory. This means incident responders have to look for subtle clues like odd command line arguments or unusual process spawning rather than obvious malware artifacts. Investigations become more complex and time consuming. If an organization isn’t monitoring how its standard tools are used, an attacker can operate for a long time living off the land. Some of the most damaging breaches in recent years involved attackers staying undetected for months by using only built in admin tools. The business risk is huge: An attacker can quietly exfiltrate data, create accounts, or deploy ransomware under the cover of normal operations. By the time anyone notices, the damage is done. As an example, the infamous DNC breach and even the 2017 Equifax incident reportedly saw attackers leveraging fileless techniques and (LOLBins) to remain undetected, leading to massive data theft.

Prevalence and Trend: From a strategic perspective, living off the land is now a mainstream attack technique. Security reports and threat intelligence consistently highlight that these techniques are on the rise. Industry and government agencies warn that adversaries are increasingly using LOTL methods across Windows, Linux, and even cloud environments. It’s not a niche tactic reserved for elite hackers even off the shelf malware kits now incorporate LOLBin usage for instance, commodity malware using PowerShell or WMI to run payloads. This ubiquity means every security team must account for (LOLBins) in their threat model. Ignoring it is an organizational oversight. If you assume that only obvious malware is a threat, you’ll miss the attack that comes in through mshta.exe or rundll32.exe. In short, (LOLBins) are important because they transform the security landscape: defenders can no longer just block bad programs, they must monitor the good ones for bad behavior.

Common Abuse or Misuse of (LOLBins)

(LOLBins) are effective for attackers precisely because they exploit the blind spots in traditional defenses. Here’s why and how they’re commonly abused:

In summary, (LOLBins) are commonly abused as a stealthy, cost effective, and deceptively legitimate attack vector. They let attackers perform the full range of malicious actions execution, network access, data theft, persistence by repurposing the same tools that keep the IT environment running. This dual use of nature tools that are helpful to admins but can be harmful in the wrong hands is what makes (LOLBins) so potent and their misuse so widespread.

Detection & Monitoring

Detecting malicious use of (LOLBins) requires a shift from looking for malicious files to scrutinizing behavior and context. Here are key strategies and indicators for defenders:

In essence, detecting (LOLBins) is about spotting the abnormal usage of normal tools. It requires good logging, an understanding of your environment’s baseline, and tooling or analysis to pinpoint anomalies. While it’s not trivial attackers deliberately make it hard, a combination of vigilant monitoring and advanced endpoint analytics can significantly tilt the odds in the defender’s favor. When done right, even the attacker’s use of native tools becomes just another behavior that can trigger alarms instead of providing cover.

Mitigation & Prevention

Preventing abuse of (LOLBins) is tricky, you can’t simply remove these binaries without breaking system functionality. However, several defensive measures can reduce the risk:

Ultimately, prevention is about reducing the attack surface available for LOLBin abuse. Since you can’t eliminate OS tools, you aim to contain and control them. By combining allowlisting, strict privilege management, and smart configuration, you force attackers to work much harder, they can no longer trivially run rampant with your system’s own binaries. Remember, there is no perfect prevention of all LOTL techniques determined adversaries can find creative twists, but these steps significantly raise the bar. They also have the side benefit of improving overall IT hygiene, not just security against (LOLBins).

Related Concepts

(LOLBins) belong to a broader class of techniques where attackers abuse what’s already there instead of bringing their own tools. This concept of living off the land LOTL extends into several related areas:

In essence, (LOLBins) are one piece of a larger puzzle of living off the land tactics. They illustrate the need for security strategies that focus on behavior and context. Understanding related concepts like fileless attacks, native tool abuse in lateral movement, and the existence of LOLBin analogues on other platforms will give a more comprehensive view of how attackers operate when they try to fly under the radar using trusted components. The better we grasp these, the more we can tighten the net around what an attacker can do unnoticed.

FAQs

The concept of (LOLBins) applies across platforms. It’s most often discussed in the Windows context Microsoft OS has many built in utilities that attackers abuse. However, Linux and Unix have their own versions commonly referred to through the GTFOBins project which lists Unix binaries that can be misused. Examples include using bash scripting, wget/curl for downloads, or tar to read sensitive files. On macOS, attackers similarly exploit native tools sometimes called LOOBins, as macOS is nicknamed the orchard for instance, using osascript to run malicious AppleScript. So no, Windows is not alone, any operating system with built in admin tools offers opportunities for living off the land. The general principle is the same: abuse what’s inherently there. But Windows has the most documented cases, thanks in part to the LOLBAS project focusing on Windows binaries.

Because it makes their job easier and their attacks stealthier. By using (LOLBins), attackers don’t need to create or smuggle in new malicious programs, they piggyback on trusted ones that already exist on the system. This has two big advantages: evasion security tools are less likely to flag built in processes, and there’s often no suspicious file to detect and efficiency they can leverage rich functionality of system tools to achieve their goals quickly. It also helps them blend in with normal operations, for example, an attacker running Robocopy to steal files looks like a regular file copy activity. Additionally, not writing custom malware means less development effort and lower chance of leaving unique traces. Essentially, it’s the path of least resistance. Why reinvent the wheel when the OS provides powerful tools that can be misused?

There’s a lot of overlap, but they’re not exactly identical concepts. Fileless attack means an attack that largely resides in memory or in script, without dropping traditional executable files on disk. (LOLBins) often facilitate fileless attacks. For instance, an Office macro might spawn PowerShell a LOLBin to execute payload code directly in memory that’s a fileless infection using a LOLBin. However, you could have fileless attacks that don’t use OS binaries e.g., injecting directly into a process via exploitation, and conversely an attacker might use a LOLBin in a way that does drop a file for example, using certutil to download a malware file that involves a file. So, they aren’t synonymous, but in practice the use of (LOLBins) is one of the most common ways to achieve a fileless attack. Many modern threats classified as fileless malware are essentially abusing (LOLBins) like PowerShell, WMI, or MSHTA to do the dirty work in memory.

Signature based anti virus AV alone often struggles here. Since (LOLBins) are legitimate programs, their binaries are not malicious so AV won’t flag cmd.exe or powershell.exe just for running. However, good EDR Endpoint Detection & Response solutions and next gen antivirus use behavioral analysis, which can detect suspicious patterns of LOLBin usage. For example, an EDR might not flag PowerShell every time, but if PowerShell starts doing things like encoding commands, touching sensitive registry keys, or spawning unknown programs, it can generate an alert. Many EDRs also incorporate cloud intelligence to recognize known malicious command line signatures or sequences. So, the short answer: a basic AV might miss it, but a well tuned EDR can catch a lot of LOLBin abuse. It’s crucial to ensure your security tools have rules or machine learning models to detect anomalous use of system processes like Office spawning a shell or command prompt launching from a service process. Also, enabling native OS features like Windows Event Logging, PowerShell module logging, etc., and feeding that into a SIEM can help detect misuse. In summary, detection is possible, but it relies on behavior based monitoring rather than traditional virus signatures.

There are many, but a few appear in attacks over and over:

These are just a sampling. The landscape evolves as new binaries and scripts with powerful capabilities are discovered even things like expand.exe or ie4uinit.exe have been identified as (LOLBins). Resources like the LOLBAS project maintain exhaustive lists.

It comes down to context and behavior. Ask a series of questions: Who is running it, how are they running it, and what is it doing? For example, if PowerShell is run by a software deployment system at 3 AM across many machines with routine scripts that’s likely legitimate. But if PowerShell is spawned by a user’s Word document and then immediately tries to access the internet or encode commands, that’s very suspect. Concretely, you look at things like:

In practice, tools can help: endpoint monitoring solutions can flag if, say, PowerShell executes an encoded command or if net.exe is used in an unusual way. But human understanding is crucial to knowing your environment’s normal. As a rule of thumb, any use of admin tools outside of documented IT procedures should be treated with zero trust until verified. It’s better to investigate a benign admin action than to miss a well hidden attack.

Combine policy, technical controls, and monitoring:

In short, prevention is about tightening the environment so that the legitimate tools can’t be easily weaponized. While you can’t eliminate all risk, you can’t turn off everything, you can significantly reduce the attacker’s options. And by coupling these preventive steps with vigilant monitoring, you create a layered defense: even if an attacker starts living off the land, you have tripwires set to catch them early and the means to stop them before they cause serious harm.

(LOLBins) exemplify the cat and mouse nature of cybersecurity. Adversaries will always seek to hide behind what is normal and trusted, and living off the land binaries gives them the perfect camouflage. In today’s threat landscape, it’s not enough to look for malware files, defenders must watch for malware behavior, even when it comes from approved programs. The key takeaway is that legitimate doesn’t mean benign: a Windows binary can be both an admin’s friend and an attacker’s weapon. By focusing on how programs act not just what they are, implementing strict controls on system tools, and maintaining visibility into their usage, security teams can strip away the attackers’ invisibility cloak. In the end, understanding (LOLBins) is about recognizing that the line between system administration and malicious activity can be razor thin and it’s our job to illuminate that line with smart monitoring and proactive defense strategies. Keep your friends close and your (LOLBins) closer!

About the Author

Mohammed Khalil is a Cybersecurity Architect at DeepStrike, specializing in advanced penetration testing and offensive security operations. With certifications including CISSP, OSCP, and OSWE, he has led numerous red team engagements for Fortune 500 companies, focusing on cloud security, application vulnerabilities, and adversary emulation. His work involves dissecting complex attack chains and developing resilient defense strategies for clients in the finance, healthcare, and technology sectors.

background
Let's hack you before real hackers do

Stay secure with DeepStrike penetration testing services. Reach out for a quote or customized technical proposal today

Contact Us