Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)

Discussion in 'other security issues & news' started by WildByDesign, Apr 18, 2018.

  1. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    This resource has just been created but is quite nice and through resource for describing Microsoft signed binaries which can be abused plus much more.


    Living Off The Land Binaries and Scripts
    Link: https://github.com/api0cradle/LOLBAS
     
  2. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,813
    Location:
    .
    From a quick glance, are those to complement the existing Florian's vulnerable process list?

    Thank you, btw.
     
  3. guest

    guest Guest

    I think so.
    Some processes are already included in the "official" Excubits blacklist but some commands are new.
    This repository gets regularily updated and is definitely worth a view.
     
  4. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,813
    Location:
    .
    (and now also Libraries)
     
  5. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,813
    Location:
    .
    Bit off-topic, sorry:

    Tried to find the meaning of "Living Off the Land" but I couldn't find anything that makes sense in this context.
    Am I right if I think that's an idiomatic expression?
     
  6. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    I think you would properly call it a metaphorical expression. The idea of living off the land is that you don't go to the store and buy what you need, you just live from natural resources, you get what you need from what the land produces. This is a metaphor for malware that gets what it needs from what is "naturally" in the OS.
     
  7. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,813
    Location:
    .
    Thanks, that's what I thought first but wasn't sure.
     
  8. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    This repo has turned out to be quite a nice and valuable resource. It seems that many of the security researchers discuss these OS binaries and how to abuse them on their blogs and share on Twitter (of all platforms) and therefore it becomes a really decent collaboration and seems to be updated regularly which is great.

    The addition of scripts and libraries is nice as well. I like how many of these detail how to use them for code execution and specific command lines and such. It makes it much easier to create blacklists to intercept.

    This does contain many of the binaries which are listed in Florian's blacklist but there are also many new additions as well. I mentioned this repo to Florian recently so that he can also follow and update his own resources. If anyone is adding any of these to their own blacklists, it is always best practice to run initially in a logging only mode so that you can determine if any of these cause issues for your system and configuration. When I add something new, I generally use the system through one or two reboots before enabling blocking mode again.

    I have not personally determined yet how best to add the scripts to my blacklist in Bouncer. I assume that I would have to add them to the command line blacklist section but haven't gotten around to doing that yet.

    @Mister X Sorry that I had missed your initial reply a while back.
     
  9. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,813
    Location:
    .
    No problem at all, thanks for replying and posting such interesting stuff as usual.
     
  10. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.