Sliver

Installation

Server Setup

Sliver's Server component has the important role of serving as the location implants will communicate back to.

Sliver's Client component has the role of being the location the user will execute the commands and tools needed to fulfill their objectives.

A downside of not having a server and a client is that everything runs inside the process of Sliver, meaning that if you accidentally terminate the process, you might lose the beacons or sessions.

Intrusionz3r0@htb[/htb]$ wget -q https://github.com/BishopFox/sliver/releases/download/vx.x.xx/sliver-server_linux
Intrusionz3r0@htb[/htb]$ chmod +x ./sliver-server_linux
Intrusionz3r0@htb[/htb]$ sudo apt install mingw-w64

Client Setup

Intrusionz3r0@htb[/htb]$ wget -q https://github.com/BishopFox/sliver/releases/download/v1.5.42/sliver-client_linux
Intrusionz3r0@htb[/htb]$ chmod +x ./sliver-client_linux
Intrusionz3r0@htb[/htb]$ ./sliver-client_linux import Intrusionz3r0_10.10.14.5.cfg 
2023/09/27 11:45:03 Saved new client config to: /home/user/.sliver-client/configs/user_ipaddress.cfg
Intrusionz3r0@htb[/htb]$ ./sliver-client_linux 

Operator profile

Sliver can differentiate who can connect based on the generated profile from its server.

Multiplayer mode

Sliver can host multiple operators simultaneously in a mode known as multiplayer.

Armory

Install external tools

Example 1: UAC-BOF-Bonanza

Example 2: Chisel

Generate Beacons

  • --jitter introduces randomness to callback times.

  • --seconds sets callback interval.

  • --skip-symbols disables obfuscation (less stealthy).

Listeners

Useful commands

Execute commands

Memory Injection & Shellcode

Privilege escalation

Credentials Attacks

Domain Enumeration

Lateral Movement

Logon Type

Value

Description

Typical Use Case

LOGON_INTERACTIVE

2

Full login session as if from keyboard input.

Run processes locally as a normal user; full access.

LOGON_NETWORK

3

For accessing network resources; no full session created.

Access remote shares (e.g. \\server\share), no process execution.

LOGON_BATCH

4

Used by scheduled tasks or batch jobs.

Run automated tasks with minimal interaction.

LOGON_SERVICE

5

Used by services running under a user account.

Run persistent background services.

LOGON_UNLOCK

7

Triggered when a user unlocks the workstation.

Not typically used in token impersonation.

LOGON_NETWORK_CLEARTEXT

8

Like network logon, but with plaintext password.

Remote authentication requiring cleartext password.

LOGON_NEW_CREDENTIALS

9

Credentials used only for outbound connections; local identity unchanged.

runas /netonly scenarios; access network as another user.

Kerberos

ADSC

Windows Enumeration

AMSI Bypass

Miscellaneous

Execute an unmanaged powershell

Project: UnmanagedPowerShell

Create a shellcode with MSFVenom and Silver

We need to create a profile, a stage-listener, a stager and generate a payload through msfvenom.

Last updated