DEV Community

Cover image for Living Off the Land Isn’t Dead, You’re Just Using 2019 LOLBins
v. Splicer
v. Splicer

Posted on

Living Off the Land Isn’t Dead, You’re Just Using 2019 LOLBins

A laptop fan spins under a fluorescent office light that never quite turns off. The machine looks ordinary until you notice the processes: signed binaries, trusted paths, system tools doing things they were never meant to do at that speed, at that scale, in that sequence.

Nothing is dropped. Nothing is installed.

Security telemetry still stays green.

That is the part that should bother you.

The uncomfortable claim is simple. Living Off the Land did not disappear. It evolved past the set of binaries most people still memorize from older playbooks. If your mental model stops at a 2019 LOLBins list, you are not looking at the current system. You are looking at its fossil record.

There is a difference between knowing the terrain and reading an old map of it. Once you notice the gap, it becomes hard to ignore.

The original idea aged into something quieter

Living Off the Land was never about a specific list of executables. It was a behavior pattern. Use what is already trusted on the system. Blend into normal administrative and operational noise. Avoid introducing artifacts that create friction in detection pipelines.

At one point, that meant PowerShell abuse, WMI, mshta, certutil, bitsadmin, and a handful of Windows-native utilities that security teams eventually started indexing like museum pieces.

Then the ecosystem changed.

Defender matured. Endpoint detection became behavioral. Telemetry shifted from file-based suspicion to process lineage, memory patterns, and cross-signal correlation. The idea that “known LOLBins” were the core problem started to drift out of phase with reality.

Attack surfaces did not shrink. They diffused.

The modern environment is less about a single machine being “used against itself” and more about an identity graph being used as infrastructure.
Defender for Endpoint changed the game, but not the direction

Modern EDR systems do not care only about what runs. They care about why it runs, what invoked it, what it touches, how it behaves over time, and how that behavior aligns with baseline identity and organizational patterns.

Microsoft Defender for Endpoint, along with similar platforms, did something subtle. It collapsed the usefulness of static tool-centric thinking.

A signed binary is no longer inherently meaningful. A known LOLBin is no longer inherently suspicious. Even “rare execution” is no longer enough.

Detection now leans on context stacking. Process ancestry. Token provenance. Script block logging. AMSI inspection. ETW traces. Cloud correlation.

The result is not that Living Off the Land stopped working. It is that it stopped being about land in the traditional sense.

The “land” expanded into systems that are not even local anymore.

2019 LOLBins are still real. They are just not sufficient

Most public lists of LOLBins still orbit Windows utilities and scripting engines. That is fine as baseline literacy. It is not sufficient as an understanding of current tradecraft.

Modern environments treat those binaries as just one layer in a much larger execution surface.

What changed is where legitimacy lives.

Legitimacy now sits in:

  • Identity providers
  • Cloud control planes
  • Enterprise SaaS integrations
  • CI pipelines
  • Device management frameworks
  • Browser execution environments

Each of these layers has its own “native tools,” its own trusted workflows, and its own assumptions about intent.

And each of them can be operated inside normal behavior profiles.

That is the shift.

Living off identity replaced living off binaries

In modern intrusions and red-team simulations, the most valuable “land” is often identity itself.

OAuth tokens, session cookies, API keys, refresh tokens, delegated permissions, service principals. These are not exploits in the traditional sense. They are continuity artifacts. They represent trust already granted.

If a system believes a request is coming from a legitimate workflow, the question is no longer “what binary is running.” It becomes “is this action consistent with expected identity behavior.”

That is a softer boundary.

And softer boundaries are harder to defend with rigid rules.

Attackers do not need exotic execution chains when they can operate inside legitimate authorization scopes.

At that point, the concept of LOLBins becomes secondary. The system is being operated through its own permission structure, not its executable surface.

The browser became a runtime environment

Another shift that older LOLBin thinking misses is the browser.

Not as a tool, but as a platform.

Modern enterprise work happens inside browsers more than operating systems. Authentication, file access, dashboards, code editors, infrastructure consoles, communication tools. All of it converges there.

That means the browser is now a primary execution context.

Extensions, injected scripts, authenticated sessions, dev tools, and cloud-based IDEs all expand the attack surface without requiring traditional payload delivery.

Even without exploitation, the browser becomes a control surface for legitimate actions at scale.

Living off the land in this context means using what the browser already trusts: authenticated sessions, cached tokens, and built-in integrations with cloud services.

No binaries required. No obvious artifacts. Just normal user capability pushed to its structural limits.

CI/CD pipelines are now part of the terrain

There is a category most people still underestimate: build systems.

GitHub Actions, GitLab runners, Jenkins pipelines, Azure DevOps. These are trusted automation systems with deep network access, cloud credentials, and broad permissions by design.

They are also highly scriptable environments that execute code routinely.

In older thinking, LOLBins were local. In modern systems, the pipeline is the machine.

If you operate inside CI/CD workflows, you are operating inside an environment that is already trusted to pull code, execute scripts, interact with cloud APIs, and deploy artifacts.

This is not abuse in the crude sense. It is architectural consequence.

The system is doing what it was designed to do. The question is who is guiding the design flow.

Endpoint security is no longer just endpoint security

The term “endpoint” itself is becoming slightly outdated in enterprise contexts.

A laptop is no longer isolated. It is a node in a managed mesh of identity, policy, cloud sync, device compliance, and remote orchestration.

Intune policies, MDM profiles, conditional access rules, device trust scores. These all influence what an endpoint can do before a process even starts.

So Living Off the Land, in modern terms, includes:

  • Abusing trusted device compliance states
  • Leveraging signed enterprise tooling
  • Operating through sanctioned remote management channels
  • Blending into automated administrative workflows

This is not about bypassing controls in a loud way. It is about moving inside the paths those controls already allow.

The new LOLBins are not binaries

If you still think LOLBins are executables, you are looking at an outdated abstraction layer.

The modern equivalents are categories of trusted functionality:

  • Identity APIs that allow delegation and impersonation within scope
  • Cloud CLI tools that operate under authenticated sessions
  • Automation frameworks embedded in enterprise tooling
  • Browser-native enterprise applications
  • Signed admin utilities bundled with OS and vendor software
  • CI/CD runners with privileged execution contexts

None of these are “exploits” by default. They are legitimate infrastructure components.

But legitimacy is not a fixed state. It is conditional on intent, timing, and context. Those conditions are exactly what modern detection systems attempt to model.

And exactly what adversarial use attempts to mirror.
Detection shifted from tools to behavior graphs

Security tooling no longer relies primarily on static signatures for LOLBins.

Instead it builds behavioral graphs:

  • Who usually runs this process
  • From where it is usually run
  • What data it usually touches
  • What time patterns it follows
  • What identity is associated with it
  • What downstream actions typically occur

This is why older LOLBin-centric thinking breaks down.

A binary is not suspicious because it exists. It becomes relevant only when it deviates from its expected behavioral cluster.

Which means the real surface area is not the tool. It is the deviation.

That is a harder problem to reason about, both for defenders and attackers.

Modern Living Off the Land is infrastructural

At this point, the phrase “living off the land” starts to blur.

It is no longer about binaries or scripts in isolation.

It is about operating inside systems that already have authority, already have trust, and already have defined behavior patterns.

Cloud consoles become execution environments. Identity providers become command channels. Automation pipelines become computation layers. Browsers become operating systems in disguise.

The “land” is now distributed across systems that were never designed to be viewed as attack surfaces individually.

That is why 2019 LOLBins feel increasingly irrelevant. They describe a local problem in a distributed world.
The real gap is not knowledge. It is framing

Most practitioners still learn LOLBins as a checklist.

That approach creates a false sense of completeness.

The reality is more fluid. Tools change. Names change. Detection shifts. What remains stable is the pattern: trusted functionality used in normal-looking ways to achieve abnormal outcomes.

The mistake is thinking the list is the system.

It never was.

The system is trust itself, expressed through software.

And trust is always larger than the tools that expose it.

Closing drift

There is a moment in every mature security system where familiarity becomes a liability. Not because it is wrong, but because it is incomplete.

Old LOLBins are still there. They still matter. They are just no longer the center of gravity.

The center moved into identity graphs, cloud APIs, and automation layers that most people interact with daily without thinking of them as attack surface.

Nothing dramatic announces this shift. No clean break. Just gradual displacement until the older model starts to feel like it belongs to a different architecture entirely.

And once you start seeing where execution actually lives now, it becomes harder to reduce it back down again.

Some systems do not stop being useful when they evolve. They just stop fitting into the categories you were using to describe them.

That is usually where the real work begins.

Check out my latest guide, which goes a step further and really digs into the nature and use of LOLBins in the year 2026:

Living Off the LOLBins: Bypassing Defender for Endpoint Without Custom Malware

Top comments (0)