Living Off the Land: Why Attackers Use Your Own Tools and How to Detect It | Lorikeet Security Skip to main content
Back to Blog

Living Off the Land: Why Attackers Use Your Own Tools and How to Detect It

Lorikeet Security Team December 20, 2025 10 min read

TL;DR: Living Off the Land (LOTL) attacks use the tools already installed on your systems — PowerShell, WMI, certutil, and dozens of others — to conduct intrusions that signature-based antivirus cannot detect. Effective defense requires behavioral monitoring, robust logging, and a security team that understands how legitimate tools get weaponized.

What "Living Off the Land" Actually Means

The term "Living Off the Land" describes an attacker's strategy of using tools and capabilities already present in the target environment rather than introducing custom malware. In practice, this means threat actors rely on built-in Windows utilities, scripting engines, and legitimate administrative software to accomplish every phase of an intrusion — from initial execution to data exfiltration.

This is not a niche technique used only by nation-state actors. LOTL methods appear in the vast majority of modern ransomware campaigns, business email compromise attacks, and advanced persistent threat operations. The reason is simple: native binaries are signed by Microsoft or trusted vendors, they are whitelisted by default in most environments, and their execution generates log entries that look identical to legitimate administrative activity.

The LOLBAS (Living Off the Land Binaries and Scripts) project catalogs over 150 Windows binaries, scripts, and libraries with documented malicious use cases. Entries include not just obvious scripting engines but also mundane utilities like certutil.exe (used for certificate management but also for downloading remote payloads and base64 encoding/decoding), mshta.exe (executes HTA files, including remotely hosted ones), regsvr32.exe (can execute arbitrary COM scriptlets via the /i flag and a remote URL), and BITS jobs managed through bitsadmin or PowerShell (used legitimately for Windows Update, abused for stealthy background downloads).


Why Attackers Prefer LOTL Over Custom Malware

Traditional intrusion detection is built around signatures: known malware file hashes, known malicious IP addresses, known payload strings. LOTL techniques discard the premise entirely. When an attacker executes a payload through PowerShell, no malicious file is written to disk in many cases — the code runs entirely in memory. When data is exfiltrated through certutil or a BITS job, the traffic pattern resembles routine Windows Update or certificate validation activity.

The operational advantages for attackers are significant:

From a defender's perspective, this means every enterprise has implicitly provided attackers with a free toolkit. The question is whether your detection infrastructure can distinguish malicious use from legitimate use.


Common LOTL Techniques in Real Incidents

Reviewing post-breach incident reports and threat intelligence from major ransomware campaigns reveals consistent patterns in how LOTL techniques are applied at each stage of an attack.

Credential Dumping via PowerShell

Invoke-Mimikatz and similar PowerShell-based credential dumping scripts load entirely in memory and extract NTLM hashes and Kerberos tickets from LSASS. No binary is written to disk. From a process creation standpoint, a standard PowerShell.exe process is launched — the malicious content exists only in the encoded command-line argument and in memory.

Lateral Movement via WMI and WinRM

Windows Management Instrumentation (WMI) allows authenticated users to execute code on remote systems. Attackers use wmic.exe or PowerShell's Invoke-WmiMethod to run commands on remote hosts using harvested credentials. WinRM (Windows Remote Management) similarly allows remote PowerShell sessions with no additional software required. Both mechanisms are standard enterprise remote management tools.

Data Exfiltration via certutil and BITS

certutil.exe can encode files in base64 and transmit them, or it can be used to download attacker-controlled payloads that are subsequently decoded and executed. BITS jobs (Background Intelligent Transfer Service) are designed to throttle bandwidth usage and resume interrupted transfers — properties that also make them ideal for covert data exfiltration that avoids triggering DLP rules calibrated for large, fast transfers.

Persistence via Scheduled Tasks and Registry Keys

Scheduled tasks created via schtasks.exe or through the Task Scheduler COM interface are a standard persistence mechanism. Registry Run keys established via reg.exe or PowerShell are equally common. Both appear in routine system logs but reveal their malicious purpose only when the command being executed is examined in context.


LOTL Detection: What Your Logging Stack Needs

Detecting LOTL attacks requires shifting from "what file is this?" to "what is this process doing, with what arguments, and is that normal for this user and system?" That shift has specific technical prerequisites.

Detection Capability What It Detects Implementation Coverage Gap Without It
PowerShell Script Block Logging Decoded PowerShell content, including obfuscated scripts and in-memory payloads Group Policy → Windows PowerShell → Turn on Script Block Logging Encoded payloads are completely invisible; only process creation is logged
Process Command-Line Logging Full command-line arguments for every process creation (Event ID 4688) Group Policy → Audit Process Creation → Include command line certutil, mshta, regsvr32 abuse is invisible without the command-line arguments
Sysmon (System Monitor) Process creation, network connections, file creation, registry changes, named pipes Deploy via GPO with a community-maintained config (e.g., SwiftOnSecurity) No network context for process activity; no visibility into child process chains
Behavioral EDR Anomalous behavior patterns: unusual parent/child process relationships, LSASS access, in-memory shellcode Crowdstrike, SentinelOne, Microsoft Defender for Endpoint, or equivalent Signature-based AV misses all LOTL techniques; memory-only attacks go undetected
Application Control (AppLocker/WDAC) Restricts which binaries can execute, limiting the LOLBAS attack surface Configure AppLocker policies to block or alert on high-risk binaries in user-writable paths All LOLBAS catalog entries remain available to attackers; no reduction in attack surface
SIEM with Behavioral Analytics Correlates process, network, and authentication events to identify attack chains Forward Sysmon + Security event logs to SIEM; build detection rules for known LOTL patterns Individual events are visible but attack chains are not correlated or alerted on

How Red Teams Use LOTL to Measure Your Detection Coverage

A well-scoped red team engagement does not just deliver a list of vulnerabilities — it tells you whether your detection and response capabilities would have caught the attack at each stage. LOTL techniques are central to this because they represent the realistic behavior of sophisticated threat actors.

During a red team assessment, Lorikeet Security tests whether your SOC or MDR provider generates alerts when PowerShell executes encoded payloads, when WMI is used to execute commands on remote hosts, or when certutil is invoked to download content from an external URL. These are not exotic techniques — they appear in the first hour of most enterprise compromises. If your detection stack does not alert on them in a controlled test, it will not alert on them in a real attack.

The output of this testing is a measurable detection gap: specific techniques that your current tooling misses, paired with concrete recommendations for new SIEM rules, Sysmon configurations, or EDR policy changes. This is the foundation of a defensible security program.


The Board-Level Implication

When a CISO presents the LOTL risk to a board or executive leadership team, the framing that lands is this: your organization can be comprehensively breached using tools that Microsoft included with Windows and that your IT team uses every day for legitimate purposes. The attacker does not need to smuggle in any malware. They can conduct the entire attack — credential theft, lateral movement, persistence, data exfiltration — using software you paid for as part of your operating system license.

This is not a theoretical risk. The CISA advisories on BlackMatter, LockBit, and ALPHV ransomware groups all document extensive use of LOTL techniques. The 2021 Kaseya supply chain attack used LOTL execution via the VSA agent. The 2024 Midnight Blizzard (SVR) intrusion operations relied heavily on PowerShell and WMI for post-compromise activity.

The investment required to close these detection gaps — Script Block Logging, process command-line auditing, a properly configured EDR, and a Sysmon deployment — is modest relative to the cost of a ransomware incident. The capability gap is a business risk, and it has a known, achievable remediation path.

Key takeaway: Signature-based antivirus cannot detect Living Off the Land attacks. If your security stack is built primarily around endpoint AV and a perimeter firewall, you have no meaningful detection coverage for the techniques used in the majority of enterprise ransomware attacks. Behavioral detection and comprehensive logging are not optional components — they are the baseline.

Find Out What Your Detection Stack Is Missing

Lorikeet Security's red team engagements test your detection coverage against real LOTL techniques — and deliver concrete, prioritized recommendations for closing the gaps your SOC can't see.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!