Pentera Logo Pentera Logo White
resources
Feb 2026
LOLBins Against the Machine: Reverse Engineering at Machine Speed
Purpose Attackers can utilize Living Off the Land Binaries (LOLBins) to execute commands, evade detection,...
Read now
“Pentera helps us prioritize what truly matters and gives us confidence we are covering our global environment continuously.”
“Seeing a domain admin account cracked in production changed how we view internal exposure.”
“Pentera helped us advance our red team and continuously improve penetration testing.”
“Pentera makes it easier to focus on what is truly exploitable instead of chasing long vulnerability lists.”
“In a complex, large-scale environment, Pentera delivers the speed and visibility security teams need.”
“Pentera amplified our team’s performance and delivered measurable value to upper management.”
"Pentera allows us to tailor testing to each service, reduce time and costs, and shift our focus from simply finding vulnerabilities to actively helping our teams fix them.”

Rubén Alonso | Head of Secure
Development Unit, Telefonica

“I don’t think we’d be able to advance our red team without Pentera. If you’re looking to improve penetration testing, I would definitely recommend it.”

Owen Fuller | Cybersecurity Engineering
Manager, Casey’s

Black Hat Webinar: The LOLBAS Odyssey

Webinars
Sep 21, 2023

This session examines how attackers abuse legitimate Windows binaries and scripts (LOLBAS) to evade detection and operate under the radar. It focuses specifically on how attackers download payloads and execute malicious code using trusted executables that are already present in enterprise environments. The webinar demonstrates a research methodology that evolved from manual testing of Office binaries into automation-driven dynamic analysis capable of scaling across thousands of executables.

The presentation explains how to instrument monitoring to identify download behavior and analyze process parent-child relationships to detect suspicious execution patterns. It also discusses future research directions, including static analysis automation and AI-assisted techniques to identify dangerous API calls. The session concludes with defender-focused recommendations for detecting and disrupting LOLBAS-driven attacks.