Sliver C2

Setup

Sliver client and server can both be downloaded from public GitHub releases, or it can manually be compiled.

Sliver Server

The Sliver server can be installed running in "Daemon mode" using the Linux Install Script. Use a quick Bash script below to help with setting up requirements and installing/running the Sliver server:

#!/bin/bash

if [[ $(/usr/bin/id -u) -ne 0 ]]; then
    echo "Not running as root"
    exit
fi

# Stop apache if its started automatically
service apache2 stop

cd /tmp
apt update -y
apt update --fix-missing -y
apt install git mingw-w64 net-tools -y

# Sliver install in Daemon mode
curl https://sliver.sh/install|sudo bash
systemctl status sliver --no-pager
echo Sliver running in Daemon mode!

# Create new user config
cd /root
IP=`curl https://ifconfig.me/ip`
./sliver-server operator --name sliver-user --lhost "$IP" --save /root/sliver-user.cfg
exit

The Sliver service can be verified that it's running with the command systemctl status sliver. Download the output config file /root/sliver-user.cfg from the above Bash script to import on your Sliver client.

If you want to automate Sliver C2 setup and deployment in DigitalOcean, check out my GitHub repo.

Sliver Client

Use the Sliver client to import your sliver-user.cfg config file and use it to connect to the Sliver server:


Usage - Useful CLI Commands Cheat Sheet


Listeners

HTTP(S)


Redirectors - HTTP(S)

TO DO


Payloads

Staged Payloads

TO DO

Beacon Payloads

TO DO

Session Payloads

TO DO

Debugging Payloads for testing

Sliver can easily create debugging payloads for testing execution or viewing C2 traffic sent by the payload or server. Use the generate --debug parameter when generating new payloads which will show the debug output in the CLI console.


BOFs

Sliver Armory

Pre-built library of BOFs that have been added to Sliver in the official repository that can easily be loaded and run in Beacons/Sessions.

Custom BOFs

Sliver Keylogger Custom Sliver keylogger BOF from trustedsec. The BOF was later added to Sliver Armory in 2023 and can easily be loaded there using armory install raw-keylogger. Usage:


OPSEC Tips

  • Best practices to modify the default HTTP(S) C2 profile at the local path /root/.sliver/configs/http-c2.json

  • Always use Sliver Armory wherever you can to execute commands within the current process instead of using commands or tools that spawn new or child processes.

Last updated