Sliver
Last updated
Last updated
Sliver is an open source projected created and maintained by BishopFox as an open source multi-platform adversary emulation and red team tool. Sliver facilitates the generations of reverse connection payloads as EXE, DLL, or Shellcode.
It has binaries for Windows, Linux, MacOS allowing you to deploy Sliver C2 infrastructure on any system.
This can be downloaded directly from the Sliver Repo using wget or directly.
Run it
Unzip the file
Make it executable
run it
to generate at payload you must know your IP address(external if this is hosted externally). This will generate a randomly named executable file file that can be delivered to targets in a variety of ways. The flags -m
and -e
flags used above represent Natural-TLS connection to use to connect back on and evasion respectively. The IP address entered is the IP address of your Sliver server.
The executable file will be in the folder where sliver was run.
The listener must be started before the delivery and exectuion of the payload on a target system. This listener will display all active connectsions from target systems to your C2 server.
Get the executable onto the victim. I'll do this via a quick python webserver.
When the server is being accessed and a file is being downloaded
On the victim machine go to the webserver and click on the file you want to download
Once it is executed, we should see the connection from the sliver terminal.
We can also check on active sessions or alive sessions with sessions
Connect to the session
Run whatever commands you may need/want: