Introduction to the introduction
Welcome to the series! Here, we’ll discuss some basic setup and environment considerations both so you have an idea of where to start and so that you have some idea of what we’re attacking. As mentioned in the README I don’t aim to be comprehensive or step-by-step here, but I don’t want you to be disoriented either.
Preliminary considerations
For the purposes of this series, redirectors, secure C2 server deployments etc. are out of scope.
Let me repeat: we will not be discussing how to deploy Sliver in an OPSEC-safe way or, frankly, a way that is appropriate for a real operation. Those issues - redirectors, OPSEC-safe red team infrastructure, etc. - are covered elsewhere.
Sliver installation
There are a variety of ways to install Sliver. The basics are detailed in the official documentation here and here.
To install from the latest official binary package on Linux regardless of distribution, use the methods linked above. It’s worth noting, however, that Kali, for example, does package Sliver, which can therefore be installed with apt install sliver
. As is common for rapidly evolving projects such as a C2 framework, there’s a tradeoff: it can be more convenient to manage with a distro package, but at the expense of more rapid change, which is valuable in a C2. I’m partial to installing directly as above and using Sliver’s built-in update
functionality.
To install from source, follow the instructions here. While not required to learn from this series, we will be covering Sliver customization later. As Sliver’s design means that the server must be re-compiled to modify implants, it’s worth getting used to building Sliver.