Table of Contents
Task 1: Introduction to LoL Attacks
Living Off the Land (LoL) attacks represent a sophisticated attack methodology where adversaries leverage pre-installed, legitimate Windows utilities instead of deploying custom malware. This approach is particularly effective because these tools are trusted by default controls, reducing detection noise and allowing malicious activity to blend seamlessly with routine administrative operations.
The fundamental advantage lies in operational simplicity: attackers avoid the risk of new binaries being flagged by antivirus solutions, exploit the fact that legitimate tools are already whitelisted in many environments, and can accomplish their objectives through legitimate-looking administrative commands.
Prerequisites Covered
Before tackling this room, familiarity with the following topics is beneficial:
Malware classification fundamentals
Introduction to malware analysis techniques
General LoL attack concepts
Learning Objectives
Understand what Living Off the Land attacks are
Identify legitimate Windows tools that can be abused
Recognise attacker techniques that blend into normal system operations
Detect LoL behaviour using log analysis and SIEM alerts
Task 2: Common LoL Tools and Techniques
Why Attackers Choose LoL Methods
Built-in tools provide several capabilities that directly match common attacker goals:
Scripting engines for code execution
Management utilities for system control
File handling capabilities for payload delivery
Scheduling mechanisms for persistence
These legitimate functions, when misused, become attack vectors for execution, persistence, reconnaissance, and lateral movement.
Key Tools and Their Abuse Patterns
PowerShell
In-memory script execution without file drops
Remote payload downloads and execution
Policy bypass through
-Exec BypassflagsAutomation of multi-stage attacks
Common parameters:
-NoP,-NonI,-W Hidden
WMIC (Windows Management Instrumentation Command-line)
Remote command execution on target systems
Process creation and management
System state queries and reconnaissance
Blends with legitimate administrative tasks
Common operations:
process call create,process get
Certutil
File downloads using
-urlcacheflagBase64 encoding/decoding of payloads
Certificate operations as cover for malicious activity
Common flags:
-urlcache -split -f,-decode,-encode
Mshta
Execution of HTML Application files
Inline JavaScript execution
Remote HTA file loading and execution
ActiveX object instantiation
Rundll32
DLL export invocation
URL protocol handler triggering
In-memory code execution
Common pattern:
rundll32.exe [DLL],ExportFunction
Scheduled Tasks (schtasks)
Persistence across system reboots
Code execution at user logon
Regular schedule-based payload execution
Common triggers: ONLOGON, DAILY, ONIDLE
Defensive Measures
Layered approach combining multiple strategies:
Apply endpoint, network, and identity protections
Implement AppLocker and Windows Defender Application Control (WDAC)
Enforce principle of least privilege
Configure network rules and DNS filtering
Maintain containment playbooks
Regularly review access and logging coverage
Task 2 - Q&A
Question | Answer |
|---|---|
Which public site lists Unix/Linux native binaries and how they can be abused? | GTFOBins |
Which Microsoft toolset includes PsExec and Autoruns, used for admin tasks and often misused by attackers? | Sysinternals |

