Sliver
Installation
Server Setup
Sliver's Server component has the important role of serving as the location implants will communicate back to.
Sliver's Client component has the role of being the location the user will execute the commands and tools needed to fulfill their objectives.
Intrusionz3r0@htb[/htb]$ wget -q https://github.com/BishopFox/sliver/releases/download/vx.x.xx/sliver-server_linux
Intrusionz3r0@htb[/htb]$ chmod +x ./sliver-server_linux
Intrusionz3r0@htb[/htb]$ sudo apt install mingw-w64Client Setup
Intrusionz3r0@htb[/htb]$ wget -q https://github.com/BishopFox/sliver/releases/download/v1.5.42/sliver-client_linux
Intrusionz3r0@htb[/htb]$ chmod +x ./sliver-client_linux
Intrusionz3r0@htb[/htb]$ ./sliver-client_linux import Intrusionz3r0_10.10.14.5.cfg
2023/09/27 11:45:03 Saved new client config to: /home/user/.sliver-client/configs/user_ipaddress.cfg
Intrusionz3r0@htb[/htb]$ ./sliver-client_linux Operator profile
Sliver can differentiate who can connect based on the generated profile from its server.
Multiplayer mode
Sliver can host multiple operators simultaneously in a mode known as multiplayer.
Armory
Install external tools
Example 1: UAC-BOF-Bonanza
Example 2: Chisel
Generate Beacons
--jitterintroduces randomness to callback times.--secondssets callback interval.--skip-symbolsdisables obfuscation (less stealthy).
One of the main disadvantages of skipping the symbol obfuscation is that the beacon will be easily detectable as Sliver due to the imports being presented in plaintext.
Listeners
Useful commands
Execute commands
execute command as it will open a command prompt or the tool's GUI.
Memory Injection & Shellcode
Privilege escalation
Credentials Attacks
Domain Enumeration
Lateral Movement
Logon Type
Value
Description
Typical Use Case
LOGON_INTERACTIVE
2
Full login session as if from keyboard input.
Run processes locally as a normal user; full access.
LOGON_NETWORK
3
For accessing network resources; no full session created.
Access remote shares (e.g. \\server\share), no process execution.
LOGON_BATCH
4
Used by scheduled tasks or batch jobs.
Run automated tasks with minimal interaction.
LOGON_SERVICE
5
Used by services running under a user account.
Run persistent background services.
LOGON_UNLOCK
7
Triggered when a user unlocks the workstation.
Not typically used in token impersonation.
LOGON_NETWORK_CLEARTEXT
8
Like network logon, but with plaintext password.
Remote authentication requiring cleartext password.
LOGON_NEW_CREDENTIALS
9
Credentials used only for outbound connections; local identity unchanged.
runas /netonly scenarios; access network as another user.
Kerberos
ADSC
Windows Enumeration
AMSI Bypass
Miscellaneous
Execute an unmanaged powershell
Project: UnmanagedPowerShell
Create a shellcode with MSFVenom and Silver
We need to create a profile, a stage-listener, a stager and generate a payload through msfvenom.
Last updated