Sliver C2 vulnerability enables attack on C2 operators through insecure Wireguard network
Depending on configuration and timing, a Sliver C2 user’s machine (operator) could be exposed to defenders through the beacon connection. In this blog post, I elaborate on some of the reverse-attack scenarios. Including attacking the operators and piggybacking to attack other victims. You could potentially gain persistence inside the C2 network as well, but I haven’t found the time to write about it in depth. submitted by /u/catmandx [link] [comments]Technical Information Security Content & DiscussionRead More