Sliver

Sliver is an open source, cross-platform, red team command and control framework written in Golang.[1]

ID: S0633
Type: TOOL
Platforms: Windows, Linux, macOS
Contributors: Achute Sharma, Keysight; Ayan Saha, Keysight
Version: 1.2
Created: 30 July 2021
Last Modified: 11 April 2024

Techniques Used

Domain ID Name Use
Enterprise T1573 .001 加密通道: Symmetric Cryptography

Sliver can use AES-GCM-256 to encrypt a session key for C2 message exchange.[2]

.002 加密通道: Asymmetric Cryptography

Sliver can use mutual TLS and RSA cryptography to exchange a session key.[3][1][2]

Enterprise T1113 屏幕捕获

Sliver can take screenshots of the victim’s active display.[4]

Enterprise T1071 .001 应用层协议: Web Protocols

Sliver has the ability to support C2 communications over HTTP/S.[3][1][5]

.004 应用层协议: DNS

Sliver can support C2 communications over DNS.[3][1][6]

Enterprise T1001 .002 数据混淆: Steganography

Sliver can encode binary data into a .PNG file for C2 communication.[7]

Enterprise T1132 .001 数据编码: Standard Encoding

Sliver can use standard encoding techniques like gzip and hex to ASCII to encode the C2 communication payload.[7]

Enterprise T1083 文件和目录发现

Sliver can enumerate files on a target system.[8]

Enterprise T1027 .013 混淆文件或信息: Encrypted/Encoded File

Sliver can encrypt strings at compile time.[1][5]

Enterprise T1049 系统网络连接发现

Sliver can collect network connection information.[9]

Enterprise T1016 系统网络配置发现

Sliver has the ability to gather network configuration information.[10]

Enterprise T1134 访问令牌操控

Sliver has the ability to manipulate user tokens on targeted Windows systems.[1][5]

Enterprise T1105 输入工具传输

Sliver can upload files from the C2 server to the victim machine using the upload command.[11]

Enterprise T1055 进程注入

Sliver can inject code into local and remote processes.[1][5]

Enterprise T1041 通过C2信道渗出

Sliver can exfiltrate files from the victim using the download command.[12]

Groups That Use This Software

Campaigns

ID Name Description
C0018 C0018

[15]

References