LOLBin
Living Off the Land Binary — a legitimate, signed system tool repurposed beyond its original intent, typically by attackers seeking to evade detection.
A LOLBin (“Living Off the Land Binary”) is a binary already present on a target system — typically signed and trusted by the operating system vendor — that an attacker can use to perform actions beyond its stated purpose: download code, execute scripts, evade detection, persist, or bypass policy.
The term comes from the broader “Living Off the Land” philosophy in offensive security: instead of bringing your own tools to a compromised system, you use what’s already there.
What qualifies a binary as a LOLBin
Three properties together:
- Pre-installed and trusted. Already present on a default OS install; signed by the vendor. AV and EDR generally allow it to run.
- Capability beyond stated purpose. The binary’s advertised function is narrow, but its actual capabilities (often via undocumented flags, scripting interfaces, or side effects) include things like arbitrary code execution, network I/O, or proxy execution.
- Documented misuse. Real-world threat actors have used it. The community curates this in the LOLBAS project — the canonical catalog of Windows LOLBins.
Why this matters for defense
Detection that focuses on “what was run” misses LOLBin abuse entirely — csc.exe, certutil.exe, and mshta.exe run constantly on legitimate Windows systems. The signal is context:
- Where was the binary invoked from?
- What were its arguments?
- What did it do next?
- Who launched it?
A csc.exe invocation from a developer’s IDE is normal. The same csc.exe invocation from a temp directory triggered by an Office macro is suspicious — same binary, completely different intent.
Common Windows LOLBins
csc.exe— the C# compiler. Compiles source code on the fly using a Microsoft-signed binary present on every default install with .NET Framework. Walked through end-to-end in Accidental LOLBin: Controlling Media Keys with csc.exe.certutil.exe— supposed to handle certificates; can also download arbitrary files (certutil -urlcache) and decode base64.mshta.exe— Microsoft HTML Application host; can execute JavaScript/VBScript inline or from a URL.regsvr32.exe— registers DLLs; via/i:urlflag, can fetch and execute remote.sctscripts (the “squiblydoo” trick).rundll32.exe— runs functions from DLLs; widely abused for proxy execution.
Each of these is the entry point to its own family of techniques in MITRE ATT&CK.
Retrieval prompts
Test recall before peeking. Spaced repetition beats re-reading.
Why do attackers prefer LOLBins over custom malware?
Four reasons: (1) Microsoft-signed binaries don't trigger AV alerts; (2) no download leaves no suspicious-file-on-disk artifact; (3) they can bypass application whitelisting policies that allow signed system files; (4) they leave fewer obvious forensic traces than custom tools.
Name three Windows LOLBins beyond csc.exe.
certutil.exe, mshta.exe, regsvr32.exe — all bundled with Windows, all signed, all capable of executing or downloading code beyond their stated purpose.