BishopFox Sliver Adversary Emulation Framework
The following analytic story providers visibility into the latest adversary TTPs in regard to the use of Sliver. Sliver has gained more traction with adversaries as it is often seen as an alternative to Cobalt Strike. It is designed to be scalable and can be used by organizations of all sizes to perform security testing. Sliver is highly modular and contains an Extension package manager (armory) allowing easy install (automatic compilation) of various 3rd party tools such as BOFs and .NET tooling like Ghostpack (Rubeus, Seatbelt, SharpUp, Certify, and so forth) (CyberReason,2023).
- Product: Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
- Datamodel: Endpoint
- Last Updated: 2023-01-24
- Author: Michael Haag, Splunk
- ID: 8c2e2cba-3fd8-424f-a890-5080bdaf3f31
Sliver is an open source cross-platform adversary emulation/red team framework produced by BishopFox.
|Notepad with no Command Line Arguments||Process Injection||TTP|
|Windows Process Injection into Notepad||Process Injection, Portable Executable Injection||Anomaly|
|Windows Service Create SliverC2||System Services, Service Execution||TTP|
source | version: 1