Sliver is a powerful command and control (C2) framework designed to provide advanced capabilities for covertly managing and controlling remote systems.
In this article, I’ll demonstrate how to set up and operate a Sliver server in a controlled lab environment designed to simulate real-world conditions, using a VPS and HTTPS for remote communication. A machine with a static public IP address is required so that the implant running on a target machine can communicate reliably. For this purpose, I recommend using a VPS running Ubuntu (24.04 or later).
WARNING
This setup should only be used in controlled lab environments or with explicit authorization.
To achieve a more realistic setup, a domain is required. Since the traffic may be monitored, using a domain makes it more likely to blend in with normal traffic.
TIP
Check the DNS C2 official documentation for more details.
Access sliver client with sliver command and execute:
Terminal window
1
https--domain<your-domain>--lets-encrypt
Sliver can automatically obtain and manage TLS certificates using Let’s Encrypt when the --lets-encrypt flag is enabled, eliminating the need for manual certificate generation.
To check if the listener was created successful execute jobs. Your Sliver server is now ready to receive implant connections, and communications will be encrypted, reducing the risk of data exposure if the network is monitored.
TIP
Check the HTTPS C2 official documentation for more details.