Sliver C2 Tutorial – Exploring The Hacker’s Armory

Sliver C2 Tutorial – Exploring The Hacker’s Armory

This transcript is a detailed walkthrough of using the Sliver C2 framework for red teaming, focusing on network setup, payload creation, and command execution. The speaker demonstrates setting up a complex virtual environment, generating various payloads with profiles, and executing assemblies and lateral movement techniques. #SliverFramework #CallbackSessions #MTLS #PowerShellEvasion #C2Profiles

Keypoints :

  • The presenter is exploring Sliver, a command and control framework, to better understand its capabilities and workflows.
  • He demonstrates designing a virtual network topology with a router, multiple virtual machines, and firewalls mimicking real environments.
  • Setup involves creating profiles for payloads, configuring C2 listeners, and generating payload files with specific options like MTLS encryption.
  • The walkthrough includes executing assembly payloads and commands for lateral movement, privilege escalation, and system reconnaissance.
  • Sliver’s modular architecture and armory package manager allow seamless integration of extensions like SMB and PowerShell modules for evasion and persistence.
  • The speaker emphasizes the importance of network configuration, such as bridged VMs and proper IP assignments, for effective operation.
  • A focus is placed on understanding Sliver’s command syntax, the distinction between sessions and beacons, and adapting settings like callback intervals.