This transcript is a detailed walkthrough of using the Sliver C2 framework for red teaming, focusing on network setup, payload creation, and command execution. The speaker demonstrates setting up a complex virtual environment, generating various payloads with profiles, and executing assemblies and lateral movement techniques. #SliverFramework #CallbackSessions #MTLS #PowerShellEvasion #C2Profiles
Keypoints :
- The presenter is exploring Sliver, a command and control framework, to better understand its capabilities and workflows.
- He demonstrates designing a virtual network topology with a router, multiple virtual machines, and firewalls mimicking real environments.
- Setup involves creating profiles for payloads, configuring C2 listeners, and generating payload files with specific options like MTLS encryption.
- The walkthrough includes executing assembly payloads and commands for lateral movement, privilege escalation, and system reconnaissance.
- Sliverβs modular architecture and armory package manager allow seamless integration of extensions like SMB and PowerShell modules for evasion and persistence.
- The speaker emphasizes the importance of network configuration, such as bridged VMs and proper IP assignments, for effective operation.
- A focus is placed on understanding Sliverβs command syntax, the distinction between sessions and beacons, and adapting settings like callback intervals.
- Youtube Video: https://www.youtube.com/watch?v=-zBxsb0yThc
- Youtube Channel: Lsecqt
- Youtube Published: Sat, 24 May 2025 14:45:54 +0000