A How-To Guide for Using Sliver
Cross-platform General Purpose
Implant Framework Written in Golang
Senior Security Associate Joe DeMesy and Security Associate Ronan Kervella are the researchers behind the creation and maintenance of Sliver. They introduced Sliver in June at SummerCon 2019.
⚠️ Warning: Sliver is currently in beta, you've been warned :) and please consider contributing.
How Sliver Works
Sliver is designed to be an open source alternative to Cobalt Strike. Sliver supports asymmetrically encrypted C2 over DNS, HTTP, HTTPS, and Mutual TLS using per-binary X.509 certificates signed by a per-instance certificate authority and supports multiplayer mode for collaboration.
We will explore how to design stable, performant, and secure C2 channels as well as other design challenges when creating implants as they present.
Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants are dynamically compiled with unique X.509 certificates signed by a per-instance certificate authority generated when you first run the binary.
The server, client, and implant all support MacOS, Windows, and Linux (and possibly every Golang compiler target but we've not tested them all).
Sliver's Features
- Dynamic code generation
- Compile-time obfuscation
- Local and remote process injection
- Anti-anti-anti-forensics
- Secure C2 over mTLS, HTTP(S), and DNS
- Windows process migration
- Windows user token manipulation
- Multiplayer-mode
- Procedurally generated C2 over HTTP (work in progress)
- Let's Encrypt integration
- In-memory .NET assembly execution
- DNS Canary Blue Team Detection
Getting Started
Download the latest release and see the Sliver wiki for a quick tutorial on basic setup and usage. To get the very latest and greatest compile from source.
Compile from Source
See the wiki.
Source Code
assets/
- Static assets that are embedded into the server binary, generated bygo-assets.sh
client/
- Client code, the majority of this code is also used by the serverprotobuf/
- - Protobuf codeserver/
-Server-side codesliver/
- Implant code, rendered by the server at runtimeutil/
- Utility functions that may be shared by the server and client
License - GPLv3
Sliver is licensed under GPLv3, some subcomponents have separate licenses. See their respective subdirectories in this project for details.
Excerpt from GitHub:
Go to https://github.com/BishopFox/sliver for the complete tooling.
Subscribe to Bishop Fox's Security Blog
Be first to learn about latest tools, advisories, and findings.
Thank You! You have been subscribed.
Recommended Posts
You might be interested in these related posts.
Nov 01, 2024
A Brief Look at FortiJump (FortiManager CVE-2024-47575)
Sep 24, 2024
Broken Hill: A Productionized Greedy Coordinate Gradient Attack Tool for Use Against Large Language Models
Sep 11, 2024
Exploring Large Language Models: Local LLM CTF & Lab
Jul 02, 2024
Product Security Review Methodology for Traeger Grill Hack