Living off the land binaries" is a term used to describe malware or hacking techniques that take advantage of legitimate
tools and processes that are already present on a computer or network, rather than introducing new malware or malicious
code. The goal is to blend in with normal activity and avoid detection. Examples of this include using built-in Windows
commands to move laterally through a network, or using scripting languages that are commonly installed on a system to
execute malicious code. LOLBAS project is documenting binaries, scripts, and libraries that can be used for Living Off
The Land techniques.
LOLBAS Feed
- Details
- Content
- Dependencies
- Version History
"Living off the land binaries" is a term used to describe malware or hacking techniques that take advantage of legitimate tools.
Living off the land binaries" is a term used to describe malware or hacking techniques that take advantage of legitimate
tools and processes that are already present on a computer or network, rather than introducing new malware or malicious
code. The goal is to blend in with normal activity and avoid detection. Examples of this include using built-in Windows
commands to move laterally through a network, or using scripting languages that are commonly installed on a system to
execute malicious code. LOLBAS project is documenting binaries, scripts, and libraries that can be used for Living Off
The Land techniques.
Name | Description |
---|---|
LOLBAS Feed | "Living off the land binaries" is a term used to describe malware or hacking techniques that take advantage of legitimate tools and processes that are already present on a computer or network, rather than introducing new malware or malicious code. The goal is to blend in with normal activity and avoid detection. Examples of this include using built-in Windows commands to move laterally through a network, or using scripting languages that are commonly installed on a system to execute malicious code. LOLBAS project is documenting binaries, scripts, and libraries that can be used for Living Off The Land techniques. |
Name | Description |
---|---|
Search LOLBAS Tools By Name | This playbook searches for LOLBAS tools by their name, and returns the tool command from LOLBAS. |
Compare Process Execution Arguments To LOLBAS Patterns | This playbook takes a process name and determines its presence in the LOLBAS repository. It then proceeds to compare the incident command line against known patterns of malicious commands listed in TIM by using LOLBAS feed integration. The playbook outputs results when the similarity between the analyzed command line and the malicious patterns is greater than or equal to the preconfigured StringSimilarity threshold. The playbook offers the flexibility to adjust this threshold through the use of the dedicated playbook input, 'StringSimilarityThreshold'. |
Name | Description |
---|---|
LOLBAS Feed | "Living off the land binaries" is a term used to describe malware or hacking techniques that take advantage of legitimate tools and processes that are already present on a computer or network, rather than introducing new malware or malicious code. The goal is to blend in with normal activity and avoid detection. Examples of this include using built-in Windows commands to move laterally through a network, or using scripting languages that are commonly installed on a system to execute malicious code. LOLBAS project is documenting binaries, scripts, and libraries that can be used for Living Off The Land techniques. |
Name | Description |
---|---|
Compare Process Execution Arguments To LOLBAS Patterns | This playbook takes a process name and determines its presence in the LOLBAS repository. It then proceeds to compare the alert command line against known patterns of malicious commands listed in TIM by using LOLBAS feed integration. The playbook outputs results when the similarity between the analyzed command line and the malicious patterns is greater than or equal to the preconfigured StringSimilarity threshold. The playbook offers the flexibility to adjust this threshold through the use of the dedicated playbook input, 'StringSimilarityThreshold'. |
Search LOLBAS Tools By Name | This playbook searches for LOLBAS tools by their name, and returns the tool command from LOLBAS. |
Pack Name | Pack By |
---|---|
Base | By: Cortex XSOAR |
Common Scripts | By: Cortex XSOAR |
Filters And Transformers | By: Cortex XSOAR |
Pack Name | Pack By |
---|
Pack Name | Pack By |
---|---|
Base | By: Cortex XSOAR |
Cortex REST API | By: Cortex XSOAR |
Filters And Transformers | By: Cortex XSOAR |
Common Scripts | By: Cortex XSOAR |
Integrations
LOLBAS Feed
- Updated the Docker image to: demisto/python3:3.10.12.66339.
Playbooks
New: Compare Process Execution Arguments To LOLBAS Patterns
- New: This playbook takes a process name and determines its presence in the LOLBAS repository. It then proceeds to compare the incident command line against known patterns of malicious commands listed in TIM by using LOLBAS feed integration. The playbook outputs results when the similarity between the analyzed command line and the malicious patterns is greater than or equal to the preconfigured StringSimilarity threshold. The playbook offers the flexibility to adjust this threshold through the use of the dedicated playbook input, 'StringSimilarityThreshold'.
- 28699
Download
"Living off the land binaries" is a term used to describe malware or hacking techniques that take advantage of legitimate tools.
PUBLISHER
PLATFORMS
INFO
Certification | Certified | Read more |
Supported By | Cortex | |
Created | May 28, 2023 | |
Last Release | April 7, 2024 |