filmov
tv
Showcasing Sliver C2 (Command and Control) \\UserWare
Показать описание
YOU CAN SUPPORT MY WORK BY BUYING A COFFEE
---------------------------------------------------
Sliver C2 is brand new (and still in development) Command and Control Framework. It has only CLI version (for now) and is designed to be extremely easy to install and to work with. It is capable of:
* Generating beacons, completely evading Windows Defender!
* Establishing Persistence with various of way, including registry tweaking.
* Many more options that we did not have the time to walk through this stream, but surely there will be part 2
We also covered powershell coding and AMSI bypassing along with a Cyber-Friend of mine \\UserWare
JOIN MY DISCORD TO SHARE KNOWLEDGE AND EXPERIENCE
---------------------------------------------------
LINKS
---------------------------------------------------
FOLLOW ME
---------------------------------------------------
TIMESTAMPS
--------------------------------------------------
00:00 - Intro
00:18 - Installing Sliver C2
04:49 - First Impressions and Generating Listeners
09:30 - Generating and Working with Beacons
17:20 - Bypassing Defender with HTTP Beacon
19:56 - C2 Walkthrough
38:39 - Establishing Persistence with Exe Hijacking
54:58 - Analyzing C2 Traffic
1:03:00 - Trying to figure out how to Establish Persistence with Registry Tweaks
1:33:50 - Establishing Persistence with Registry Tweaks
1:46:43 - Learning AMSI Bypass, loading PowerView
2:04:50 - Converting Beacons with MSFVenom
2:14:18 - Outro with Cyber Report about APT-29
Hope you learned something new!
---------------------------------------------------
Sliver C2 is brand new (and still in development) Command and Control Framework. It has only CLI version (for now) and is designed to be extremely easy to install and to work with. It is capable of:
* Generating beacons, completely evading Windows Defender!
* Establishing Persistence with various of way, including registry tweaking.
* Many more options that we did not have the time to walk through this stream, but surely there will be part 2
We also covered powershell coding and AMSI bypassing along with a Cyber-Friend of mine \\UserWare
JOIN MY DISCORD TO SHARE KNOWLEDGE AND EXPERIENCE
---------------------------------------------------
LINKS
---------------------------------------------------
FOLLOW ME
---------------------------------------------------
TIMESTAMPS
--------------------------------------------------
00:00 - Intro
00:18 - Installing Sliver C2
04:49 - First Impressions and Generating Listeners
09:30 - Generating and Working with Beacons
17:20 - Bypassing Defender with HTTP Beacon
19:56 - C2 Walkthrough
38:39 - Establishing Persistence with Exe Hijacking
54:58 - Analyzing C2 Traffic
1:03:00 - Trying to figure out how to Establish Persistence with Registry Tweaks
1:33:50 - Establishing Persistence with Registry Tweaks
1:46:43 - Learning AMSI Bypass, loading PowerView
2:04:50 - Converting Beacons with MSFVenom
2:14:18 - Outro with Cyber Report about APT-29
Hope you learned something new!
Комментарии