We may earn an affiliate commission when you visit our partners.
Matt Glass

Are you looking for a versatile command and control server with implants for almost every architecture? In this course, you will learn Command and Control using Sliver.

Read more

Are you looking for a versatile command and control server with implants for almost every architecture? In this course, you will learn Command and Control using Sliver.

Sliver is a command and control server for adversary emulation. In this course, Command and Control with Sliver, you’ll cover how to utilize Sliver to execute Command and Control in a red team environment. First, you’ll witness how to generate implants for your targets. Next, you’ll apply the implants to your targets and generate sessions with the server. Finally, you’ll simulate command and control over multiple protocols. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques: T1071.001 and T1071.004 using Sliver. More importantly, knowing how these techniques can be used against you will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.

Enroll now

What's inside

Syllabus

Course Overview
Command and Control with Sliver
Resources

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Meant for experienced cybersecurity professionals and red teamers
Requires knowledge in system exploitation, network protocols, and command and control mechanisms

Save this course

Save Command and Control with Sliver to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Command and Control with Sliver with these activities:
Review Network Communication Protocols
Strengthen understanding of network communication protocols to enhance comprehension of implant communication and command and control mechanisms.
Browse courses on Network Protocols
Show steps
  • Review course materials and external resources on network protocols, such as TCP/IP, UDP, and HTTP
  • Set up lab exercises to simulate network traffic and analyze protocol behavior
  • Participate in online forums or discussions to share knowledge and clarify concepts
Seek Guidance from Sliver Experts
Connect with experienced professionals in the field of command and control to gain valuable insights and guidance, fostering professional growth.
Browse courses on Command and Control
Show steps
  • Identify potential mentors through LinkedIn, industry events, or online forums
  • Reach out via email or direct message, expressing interest in their expertise and willingness to learn
  • Schedule meetings or virtual sessions to discuss Sliver techniques, industry trends, and career development
Explore Sliver's documentation
Review Sliver's documentation to enhance understanding of its features and capabilities, fostering mastery of command and control techniques.
Browse courses on Command and Control
Show steps
  • Access the Sliver documentation website or GitHub repository
  • Read through the sections on implant generation, session management, and command execution
  • Try out the examples provided in the documentation to gain practical experience
Three other activities
Expand to see all activities and additional details
Show all six activities
Discuss Sliver Implant Techniques
Engage with peers to share and discuss different implant techniques in Sliver, exchanging knowledge and broadening perspectives.
Browse courses on Command and Control
Show steps
  • Join or create a study group or online forum dedicated to Sliver and command and control
  • Participate in discussions, asking questions and sharing experiences related to implant generation and usage
  • Collaborate on implant-related projects or exercises
Create a Command and Control Scenario
Develop a realistic command and control scenario using Sliver, simulating attacker behaviors to strengthen comprehension and practical application.
Browse courses on Command and Control
Show steps
  • Define the scenario, including target systems, implants to be used, and desired outcomes
  • Set up the Sliver server and implant the target systems using techniques learned in the course
  • Execute commands remotely and monitor the results through the Sliver interface
  • Document and analyze the results to identify potential weaknesses and areas for improvement
Develop a Sliver Implant Handbook
Create a comprehensive handbook that documents various Sliver implant techniques, serving as a valuable reference and reinforcement of key concepts.
Browse courses on Command and Control
Show steps
  • Gather information from the course materials, documentation, and external resources
  • Organize the handbook into sections based on implant types, architectures, and functionality
  • Write clear and concise descriptions of each implant technique, including code examples
  • Review and edit the handbook to ensure accuracy and clarity

Career center

Learners who complete Command and Control with Sliver will develop knowledge and skills that may be useful to these careers:
Incident Responder
Incident Responders are responsible for responding to security incidents and taking steps to mitigate their impact. They may also be responsible for investigating security breaches and developing and implementing security policies and procedures. The Command and Control with Sliver course may be useful for Incident Responders, as it provides instruction on how to use Sliver to execute Command and Control in a red team environment. This knowledge can be used to test an organization's security defenses and identify vulnerabilities that could be exploited by attackers.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They may also be responsible for investigating security breaches and developing and implementing security policies and procedures. The Command and Control with Sliver course can be helpful for Information Security Analysts, as it provides instruction on how to use Sliver to execute Command and Control in a red team environment. This knowledge can be used to test an organization's security defenses and identify vulnerabilities that could be exploited by attackers.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining an organization's security infrastructure. They may also be responsible for developing and implementing security policies and procedures, and for investigating security breaches. The Command and Control with Sliver course may be useful for Security Engineers, as it provides instruction on how to use Sliver to execute Command and Control in a red team environment. This knowledge can be used to test an organization's security defenses and identify vulnerabilities that could be exploited by attackers.
Penetration Tester
Penetration Testers are responsible for simulating attacks on an organization's computer networks and systems to identify vulnerabilities that could be exploited by attackers. They may also be responsible for developing and implementing security policies and procedures. The Command and Control with Sliver course may be useful for Penetration Testers, as it provides instruction on how to use Sliver to execute Command and Control in a red team environment. This knowledge can be used to test an organization's security defenses and identify vulnerabilities that could be exploited by attackers.
Security Analyst
Security Analysts are responsible for monitoring an organization's computer networks and systems for security breaches and other suspicious activity. They may also be responsible for investigating security incidents and developing and implementing security policies and procedures. The Command and Control with Sliver course may be useful for Security Analysts, as it provides instruction on how to use Sliver to execute Command and Control in a red team environment. This knowledge can be used to test an organization's security defenses and identify vulnerabilities that could be exploited by attackers.
Network Security Engineer
Network Security Engineers are responsible for designing, implementing, and maintaining an organization's network security infrastructure. They may also be responsible for monitoring network traffic and investigating security incidents. The Command and Control with Sliver course may be useful for Network Security Engineers, as it provides instruction on how to use Sliver to generate implants for targets and generate sessions with the server. This knowledge can be used to test an organization's network security defenses and identify vulnerabilities that could be exploited by attackers.
Malware Analyst
Malware Analysts are responsible for analyzing malware samples and developing techniques to detect and prevent malware infections. They may also be responsible for investigating malware outbreaks and developing and implementing security policies and procedures. The Command and Control with Sliver course may be useful for Malware Analysts, as it provides instruction on how to use Sliver to generate implants for targets and generate sessions with the server. This knowledge can be used to analyze malware samples and develop techniques to detect and prevent malware infections.
Computer Forensic Analyst
Computer Forensic Analysts are responsible for collecting, preserving, and analyzing digital evidence from computers and other electronic devices. They may also be responsible for investigating computer crimes and developing and implementing security policies and procedures. The Command and Control with Sliver course may be useful for Computer Forensic Analysts, as it provides instruction on how to use Sliver to execute Command and Control in a red team environment. This knowledge can be used to investigate computer crimes and identify vulnerabilities that could be exploited by attackers.
IT Auditor
IT Auditors are responsible for assessing an organization's IT systems and processes to ensure that they are compliant with applicable laws and regulations. They may also be responsible for investigating security breaches and developing and implementing security policies and procedures. The Command and Control with Sliver course may be useful for IT Auditors, as it provides instruction on how to use Sliver to execute Command and Control in a red team environment. This knowledge can be used to test an organization's security defenses and identify vulnerabilities that could be exploited by attackers.
Cybersecurity Consultant
Cybersecurity Consultants are responsible for providing advice and guidance to organizations on how to improve their cybersecurity posture. They may also be responsible for conducting security assessments and developing and implementing security policies and procedures. The Command and Control with Sliver course may be useful for Cybersecurity Consultants, as it provides instruction on how to use Sliver to execute Command and Control in a red team environment. This knowledge can be used to test an organization's security defenses and identify vulnerabilities that could be exploited by attackers.
Information Security Risk Manager
Information Security Risk Managers are responsible for assessing an organization's security risks and developing and implementing strategies to mitigate those risks. They may also be responsible for developing and implementing security policies and procedures. The Command and Control with Sliver course may be useful for Information Security Risk Managers, as it provides instruction on how to use Sliver to execute Command and Control in a red team environment. This knowledge can be used to test an organization's security defenses and identify vulnerabilities that could be exploited by attackers.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for overseeing an organization's cybersecurity program. They may also be responsible for developing and implementing security policies and procedures, and for managing the organization's security team. The Command and Control with Sliver course may be useful for CISOs, as it provides instruction on how to use Sliver to execute Command and Control in a red team environment. This knowledge can be used to test an organization's security defenses and identify vulnerabilities that could be exploited by attackers.
Security Manager
Security Managers are responsible for developing and implementing an organization's security program. They may also be responsible for managing an organization's security team and for developing and implementing security policies and procedures. The Command and Control with Sliver course may be useful for Security Managers, as it provides instruction on how to use Sliver to execute Command and Control in a red team environment. This knowledge can be used to test an organization's security defenses and identify vulnerabilities that could be exploited by attackers.
Cybersecurity Engineer
Cybersecurity Engineers are responsible for designing, implementing, and maintaining an organization's cybersecurity infrastructure. They may also be responsible for developing and implementing security policies and procedures. The Command and Control with Sliver course may be useful for Cybersecurity Engineers, as it provides instruction on how to use Sliver to execute Command and Control in a red team environment. This knowledge can be used to test an organization's security defenses and identify vulnerabilities that could be exploited by attackers.
Software Developer
Software Developers are responsible for designing, developing, and testing software applications. They may also be responsible for developing and implementing security features into software applications. The Command and Control with Sliver course may be useful for Software Developers, as it provides instruction on how to use Sliver to execute Command and Control in a red team environment. This knowledge can be used to develop secure software applications and to identify vulnerabilities that could be exploited by attackers.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Command and Control with Sliver.
Practical Malware Analysis provides a hands-on guide to dissecting malicious software. It valuable resource for understanding the internals of malware and how to analyze it.
Cryptographic Engineering provides a comprehensive overview of cryptographic engineering. It valuable resource for understanding the basics of cryptography and how to use it to design and implement secure systems.
Introduces readers to a variety of software exploitation techniques. It teaches users how to find and exploit vulnerabilities in software.
Reversing: Secrets of Reverse Engineering provides a comprehensive overview of reverse engineering. It valuable resource for understanding the basics of reverse engineering and how to use it for security research.
The Shellcoder's Handbook provides a comprehensive overview of shellcoding, a powerful technique used by attackers to exploit security vulnerabilities. It valuable resource for understanding the basics of shellcoding and how to use it for security research.
Ghost in the Wires is an autobiography of Kevin Mitnick, one of the most famous hackers in history. It fascinating look at the life of a hacker and how he was able to evade capture for so long.
Metasploit: The Penetration Tester's Guide comprehensive guide to Metasploit, one of the most popular penetration testing frameworks. It valuable resource for learning how to use Metasploit for a variety of security tasks.
The Art of Deception provides a fascinating look at the human element of security. It valuable resource for understanding how attackers use social engineering techniques to compromise systems and data.
The Code Book provides a fascinating look at the history of cryptography. It valuable resource for understanding the evolution of cryptography and how it has been used to protect information throughout history.
Provides a comprehensive guide to C++ security. It covers a wide range of topics, including secure programming practices, buffer overflows, memory safety, and more.
Gray Hat Hacking provides a practical introduction to hacking techniques and methodologies. It valuable resource for understanding the basics of hacking and how to use it for ethical purposes.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser