Showcasing Sliver C2 (Command and Control) \\UserWare

preview_player
Показать описание
YOU CAN SUPPORT MY WORK BY BUYING A COFFEE
---------------------------------------------------

Sliver C2 is brand new (and still in development) Command and Control Framework. It has only CLI version (for now) and is designed to be extremely easy to install and to work with. It is capable of:
* Generating beacons, completely evading Windows Defender!
* Establishing Persistence with various of way, including registry tweaking.
* Many more options that we did not have the time to walk through this stream, but surely there will be part 2

We also covered powershell coding and AMSI bypassing along with a Cyber-Friend of mine \\UserWare

JOIN MY DISCORD TO SHARE KNOWLEDGE AND EXPERIENCE
---------------------------------------------------

LINKS
---------------------------------------------------

FOLLOW ME
---------------------------------------------------

TIMESTAMPS
--------------------------------------------------
00:00 - Intro
00:18 - Installing Sliver C2
04:49 - First Impressions and Generating Listeners
09:30 - Generating and Working with Beacons
17:20 - Bypassing Defender with HTTP Beacon
19:56 - C2 Walkthrough
38:39 - Establishing Persistence with Exe Hijacking
54:58 - Analyzing C2 Traffic
1:03:00 - Trying to figure out how to Establish Persistence with Registry Tweaks
1:33:50 - Establishing Persistence with Registry Tweaks
1:46:43 - Learning AMSI Bypass, loading PowerView
2:04:50 - Converting Beacons with MSFVenom
2:14:18 - Outro with Cyber Report about APT-29

Hope you learned something new!
Рекомендации по теме
Комментарии
Автор

Awesome video.
Documentation is good but having a video is plus point.
Eagerly waiting for part 2.

deadpiece
Автор

There were a lot of golden nuggets of knowledge here! Thanks a lot :)

Philbertsroom
Автор

Good Video || Covered valubale topics, its nice, I wanted this video, Keep Up the good work Lsec and UserWare

aibel
Автор

Appreciate the video ! Been having fun with this tool

foxracing
Автор

Best walkthrough for the tool on youtube

caffiend
Автор

@Lsecqt 16:48 the ui is crappy due to hardware acceleration. It is turned on by default, and it fucks up on vm's. it can be disabled in edge setting or with powershell. (:

andreasMou
Автор

Hey ! Nice video :D
Do you know if there is a way to configure different evasion techniques with sliver?
Or put differently, do you know what different types of evasion techniques sliver uses?

lolapalooza
Автор

Sound is so cool could you tell me which kind of software he is using 🤔🤔

dnx
Автор

Heyy pretty cool stuff. I was playing with it recently too its really really good. The only issue i have with it is the huge sizes of the payloads lol.
Let me know if you get the stagers working with HTTP :p the docs on the github mention something about a woff file but i cant seem to find what that means lol.

hellblazer
Автор

how to work with UPLOAD command please share example ?

tefa
Автор

Just to let you know the Defender detects the exe for me, any recomendation?

zker
Автор

can't we use sliver as a teamserver Just like cobalt strike?

hash
Автор

to bad the one dude sounds so horrible. i realize you're doing this for free, but I'm tapping out. it's just to distracting and hard to understand.

murrij
Автор

Your friend voici make it horrible i quit after 5min. The subject was interesting sadly not oleasant with voice like that... he thought NSA will arrest him...

trustedsecurity
Автор

Great video, thanks! I'm new to offensive/red teaming, and found the walk-through helpful. Do you know when a part 2 will come out, exploring other features? If not, can you recommend any videos/resources?

FuckYeahFrances