-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Beginner's Guide
A command and control (C2) framework allows attackers to fully leverage existing access to computer systems or networks, it by itself will not get you access to systems that you do not already have. There are many techniques for gaining initial access, however some of the most common are exploiting software vulnerabilities using something like Metasploit, or by social engineering a user to inadvertently execute a C2 payload. This is referred to as "post-exploitation."
Throughout this guide and the Sliver code base the following terms of art are used. These definitions may vary slightly across the industry but this is how we define them: Implant - A piece of software used to maintain access to an environment or system, generally through the use of command and control (C&C, C2, etc.).
-
Beacon - May refer to (1) a communication pattern where an implant periodically connects to the C2 server as apposed to using a stateful/real time connection (2) Cobalt Strike's primary implant, more often called "CS Beacon."
-
Loader - A piece of software that can load an artifact into memory and execute it. The term is sometimes used interchangeably with stager. Though loader is a more generic term i.e., a stager is a specific kind of loader.
"Bred as living shields, these slivers have proven unruly—they know they cannot be caught."