detecting-living-off-the-land-attacks

Installation
SKILL.md

Detecting Living Off the Land Attacks

Monitor for suspicious use of legitimate Windows binaries (LOLBins) including certutil, mshta, rundll32, regsvr32, and others used in fileless and living-off-the-land attack techniques.

When to Use

  • Building detection rules for SIEM or EDR platforms to catch LOLBin abuse in real time
  • Investigating alerts where legitimate system binaries appear in unexpected execution contexts
  • Threat hunting across endpoint telemetry for fileless attack indicators
  • Hardening application whitelisting policies (AppLocker, WDAC) to restrict dangerous LOLBin usage
  • Creating Sysmon configurations tuned to capture LOLBin-related process creation events
  • Responding to incidents where adversaries bypassed AV by using only built-in OS tools

Do not use for blocking all LOLBin execution outright; these are legitimate system tools with valid administrative uses. Detection must focus on anomalous context (parent process, command-line arguments, network activity) rather than binary presence alone.

Prerequisites

Related skills
Installs
6
GitHub Stars
6.2K
First Seen
Mar 16, 2026