Hackers are constantly looking for ways to go undetected. What if you could enumerate an environment, execute unsigned binaries, and even cover your tracks with tools that are already built into the Windows operating system? Well, you can. LOL.
Mission: Attempt to proxy a binary like calc.exe and get it to run using one of the LOL methods we discussed.