Showcasing Sliver C2 (Command and Control) \\UserWare

Описание к видео Showcasing Sliver C2 (Command and Control) \\UserWare

YOU CAN SUPPORT MY WORK BY BUYING A COFFEE
---------------------------------------------------
https://www.buymeacoffee.com/lsecqt

Sliver C2 is brand new (and still in development) Command and Control Framework. It has only CLI version (for now) and is designed to be extremely easy to install and to work with. It is capable of:
Generating beacons, completely evading Windows Defender!
Establishing Persistence with various of way, including registry tweaking.
Many more options that we did not have the time to walk through this stream, but surely there will be part 2

We also covered powershell coding and AMSI bypassing along with a Cyber-Friend of mine \\UserWare

JOIN MY DISCORD TO SHARE KNOWLEDGE AND EXPERIENCE
---------------------------------------------------
  / discord  

LINKS
---------------------------------------------------
HackTheBox : https://app.hackthebox.com/home
Privesc Blog:   / privilege-escalation-with-mysql-user-defin...  

FOLLOW ME
---------------------------------------------------
Twitter:   / lsecqt  
Twitch:   / lsecqt  
Reddit:   / lsecqt  
Medium:   / lsecqt  

TIMESTAMPS
--------------------------------------------------
00:00 - Intro
00:18 - Installing Sliver C2
04:49 - First Impressions and Generating Listeners
09:30 - Generating and Working with Beacons
17:20 - Bypassing Defender with HTTP Beacon
19:56 - C2 Walkthrough
38:39 - Establishing Persistence with Exe Hijacking
54:58 - Analyzing C2 Traffic
1:03:00 - Trying to figure out how to Establish Persistence with Registry Tweaks
1:33:50 - Establishing Persistence with Registry Tweaks
1:46:43 - Learning AMSI Bypass, loading PowerView
2:04:50 - Converting Beacons with MSFVenom
2:14:18 - Outro with Cyber Report about APT-29

Hope you learned something new!

Комментарии

Информация по комментариям в разработке