Part 2 - Detecting C2 Activity
A hands-on SOC lab for detecting and analyzing C2 activity using Sliver and LimaCharlie, covering payload execution, process monitoring, and network forensics
Generating and Deploying a C2 Payload
1️⃣ Start an SSH Session
ssh user@[Linux_VM_IP]sudo su
cd /opt/sliver
2️⃣ Launch the Sliver Server

3️⃣ Generate the Payload

4️⃣ Verify the Payload

5️⃣ Transfer the Payload to Windows VM
6️⃣ Take a VM Snapshot
Starting Command and Control (C2) Session
1️⃣ Stop the Python Web Server
2️⃣ Relaunch Sliver
3️⃣ Start the HTTP Listener
4️⃣ Execute the C2 Payload on Windows

5️⃣ Verify Active Sessions in Sliver

6️⃣ Interact with the C2 Session
7️⃣ Gather System Information
Get Session Info
Identify the User and Privileges
Identify the Current Directory
Examine Network Connections
List Running Processes
Observing EDR Telemetry in LimaCharlie
Exploring LimaCharlie Web UI
Step 1: Accessing Sensors
Step 2: Process Monitoring
Identifying Suspicious Processes
Step 3: Network Monitoring
Step 4: File System Analysis
Step 5: Timeline Analysis
Last updated





