Skip to content
25 June 2025
  • LinkedIn
  • Twitter
  • Facebook
  • Instagram
  • Discord
  • Telegram
  • WhatsApp

The SOC Labs

#1 Cybersecurity News Platform

Primary Menu
  • Home
  • Advertise
  • Write For Us
  • Free SOC Tools
    • Strong Password Generator
    • Base64 Encode/Decode
  • Contact Us
  • Home
  • Blog
  • What are LoLBins? Here’s a Full List of LoLBins used in Living-Off-The-Land LoTL Attacks
  • Blog

What are LoLBins? Here’s a Full List of LoLBins used in Living-Off-The-Land LoTL Attacks

The SOC Labs Team 4 December 2024
How to Prevent Cyber Attacks in 2024?

So, you want to know what are LoLBins? You’re at right place. Here’s an expanded table with additional LoLBin tools and their use in Living-off-the-Land (LoTL) attacks.

Table of Contents

Toggle
  • What are LoLBins?
  • List of LoLBins Used By Cybercrimals in Cyber Attacks
    • Protective Measures While Combating LoLBins

What are LoLBins?

LOLBins is the abbreviated term for Living Off the Land Binaries. Living Off the Land Binaries are binaries of a non-malicious nature, local to the operating system, that have been utilised and exploited by cyber criminals and crime groups to camouflage their malicious activity.

List of LoLBins Used By Cybercrimals in Cyber Attacks

LoLBinHow Cyber Criminals Use The Tool to Perform LoTL Attacks
PowerShellUsed for downloading and executing malicious scripts, fileless malware execution, reconnaissance, and data exfiltration, often bypassing traditional antivirus defenses
certutilAbused to download malicious files, decode Base64-encoded payloads, and as a simple data exfiltration tool by copying data to a remote server
MshtaExecutes malicious JavaScript or VBScript hosted remotely or locally, allowing attackers to execute code within the user’s context without raising suspicion
wmicUsed for remote code execution, reconnaissance, and lateral movement by running commands on remote systems, often bypassing security controls
rundll32Executes DLL files and scripts, allowing attackers to run malicious code or scripts without dropping an executable on disk, aiding in evasion of antivirus
regsvr32Utilized to execute malicious scripts or COM objects via .sct files, aiding in fileless attacks and bypassing application whitelisting
schtasksCreates or modifies scheduled tasks for persistence, enabling attackers to execute malicious code at specified times or after system reboots
bitsadminAbused to download files or execute commands, often used to download malicious payloads stealthily from the internet or an intranet server
atSimilar to `schtasks`, used to schedule tasks for executing malicious commands, particularly on older systems where `schtasks` is unavailable
cmd.exeThe command prompt itself can be used for executing malicious scripts, commands, and facilitating various types of attacks while blending in with normal operations
msiexecExploited to download and execute malicious MSI packages or scripts, allowing attackers to deliver payloads and execute them silently without dropping an executable
conhostUsed in conjunction with other tools like PowerShell to hide the command prompt window when running malicious commands, helping avoid detection
netshAbused to create firewall exceptions, set up network redirections, or configure proxy settings to bypass network security controls and exfiltrate data through network tunneling
taskkillUsed to terminate security-related processes or services, enabling attackers to disable security defenses during an attack, thereby avoiding detection or interruption
bginfoAbused to execute arbitrary commands while displaying system information, used to run malicious code disguised as part of legitimate system management tasks, often as part of a larger attack chain
mavinjectInjects code into running processes, which can be used for stealthy execution of malicious code within trusted processes, bypassing security software
msdtWindows troubleshooting utility that can be used to execute PowerShell commands or scripts by exploiting vulnerabilities like Follina, allowing attackers to run code remotely with minimal detection
cscriptExecutes VBScript and JScript files, often used to run malicious scripts as part of fileless attacks or in conjunction with other LoLBins like `mshta` or `regsvr32`, enabling attackers to execute code without dropping files on disk
wscriptSimilar to `cscript`, used for executing malicious scripts, often as part of phishing campaigns or lateral movement techniques within a compromised network
sc.exeUsed to create, configure, or start/stop services, enabling attackers to create malicious services for persistence or to run malicious code with system privileges, which can be particularly dangerous if the service is run as a privileged user
whoamiUsed by attackers to enumerate user permissions, privileges, and group memberships, aiding in privilege escalation and lateral movement within a compromised network
reg.exeUsed to manipulate the Windows Registry, allowing attackers to establish persistence, disable security features, or execute malicious payloads upon system reboot or user login
findstrAbused to search for sensitive information within files, such as passwords or tokens, which can then be exfiltrated by the attacker for further exploitation or lateral movement
caclsAbused to modify file permissions, allowing attackers to escalate privileges or lock legitimate users out of files, potentially leading to further compromise or denial of service attacks
net.exeExploited to enumerate users, groups, shares, and sessions within a network, as well as to add users or modify group memberships, often as part of lateral movement or privilege escalation strategies
wmiprvse.exeUsed by attackers to execute WMI (Windows Management Instrumentation) commands for system reconnaissance, process creation, or remote command execution, often without leaving traces that would trigger traditional detection mechanisms
nltestAbused to query domain information, identify domain controllers, and test trust relationships, which can be leveraged by attackers to facilitate lateral movement and further network compromise, particularly in Active Directory environments
powershell_iseUsed similarly to PowerShell but in an integrated scripting environment, which can provide a more stealthy means of script execution and testing by attackers within compromised environments, often bypassing detection mechanisms focused on standard PowerShell activity
esentutlA database utility used to extract and manipulate data from database files, which can be exploited to access sensitive information or to establish persistence by modifying the database or recovering data from deleted files that may contain valuable information for attackers
ForfilesAbused to execute commands on a collection of files, often used by attackers for mass data exfiltration or modification, enabling them to operate on multiple files simultaneously without triggering alerts, particularly in automated environments where such operations may go unnoticed
expand.exeA tool used to extract files from compressed CAB files, which can be exploited by attackers to deploy malware hidden within such archives, enabling the installation of malicious software that might bypass basic signature-based detection mechanisms
clip.exeUsed to redirect command output to the clipboard, which can be leveraged by attackers to silently steal sensitive information from command-line outputs without leaving obvious traces, enabling exfiltration of critical data in a stealthy manner
makecab.exeUsed to create CAB files from a set of files, which can be exploited by attackers to compress and package malware or sensitive data for exfiltration, often bypassing basic data loss prevention (DLP) mechanisms due to the use of a legitimate and commonly whitelisted utility

This expanded table includes a wide array of LoLBins that attackers can exploit for various stages of an attack, from initial compromise to lateral movement, persistence, and data exfiltration. These tools are favored because they blend in with normal system activity, making detection more challenging for traditional security measures.

Protective Measures While Combating LoLBins

Combating LoLBins is literally fist fighting with notorious cyber threat actors. If you’re not careful, you may endup in a disaster. Staying protected is key before taking down adversaries.  It is always recommended to use a VPN service like NordVPN, Surfshark, or PureVPN and use security solutions like Panda Security or MalwareBytes while performing the analysis to stay protected.

Get Malwarebytes Protection
Figure: What are LoLBins? – Get Malwarebytes Protection
How to take down a phishing website - Get NordVPN
Figure: What are LoLBins? – Get NordVPN

For cybersecurity news and updates, follow us on Cybersecurity – The SOC Labs.

Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The SOC Labs assumes no liability for the accuracy or consequences of using this information.

Continue Reading

Previous: How to Take Down a Phishing Website: A Step-by-Step Guide
Next: TikTok Banned: Is TikTok Getting Banned in US in 2025? All You Need To Know

Related Stories

how to take down a phishing website?
  • Blog

How to Take Down a Phishing Website: A Step-by-Step Guide

The SOC Labs Team 27 November 2024
What is Quantum Computing in Cybersecurity?
  • Blog

What is Quantum Computing in Cybersecurity? Next Big Threat That Will Bite You If Unprepared?

The SOC Labs Team 19 November 2024
Ransomware Attack Meaning
  • Blog

Ransomware Attack Meaning: What to Do if Your Company is Hit by a Ransomware Attack?

The SOC Labs Team 2 November 2024
List of Free SOC Tools >
Strong Password Generator

Strong Password Generator






Generated password:

Great Deals. Great Devices. Every Day. Shop the Acer Store Now!
  • Privacy Policy
  • Disclaimer
  • Contact Us
  • About Us
  • LinkedIn
  • Twitter
  • Facebook
  • Instagram
  • Discord
  • Telegram
  • WhatsApp
Copyright © All rights reserved. | MoreNews by AF themes.
Go to mobile version