RogueSliver: disrupt campaigns using the Sliver C2 framework
RogueSliver
A suite of tools to disrupt campaigns using the Sliver C2 framework.
This tool, its uses, and how it was created will be covered in depth on ACEResponder.com
This tool is for educational purposes only.
ExtractCerts.py | Extract mtls certificates and private keys from a minidump of an infected process. Also extracts the implant ID and mtls endpoints. |
CrashSliverServer.py | Takes advantage of a resource exhaustion vulnerability in the Sliver mtls endpoint. Running this with mtls certs will crash a remote Sliver server. |
BeaconFlood.py | Flood a Sliver C2 server with beacon and session registrations. Requires mtls certificates. |
HijackBeacon.py | Hijack a beacon with a valid implant ID and certificates. Log your attacker’s requests and send them some memes. Can also create a new false beacon with just an mtls cert. |
Install
git clone https://github.com/ACE-Responder/RogueSliver.git
python -m pip install -r requirements.txt
Use
ExtractCerts
./ExtractCerts.py sliver.DMP
CrashSliverServer.py
./CrashSliverServer.py 127.0.0.1 8888
BeaconFlood.py
./BeaconFlood.py 127.0.0.1 8888
HijackBeacon
./HijackBeacon.py 2aa18069-652a-4484-8ebe-abae87ebc73e 127.0.0.1 8888 -r