Adversary Emulation Framework
Fix for DNS C2, and other small backports. Hoping to have a v1.6 release soon with many more updates!
⚠️ Backwards incompatible changes ⚠️
This release fixes a vulnerability (CVE-2023-34758) in the Sliver Key Encapsulation Mechanism (KEM), where improper use of Nacl Box (libsodium) could allow a MitM attacker with a copy of the implant binary to recover the session key and arbitrarily encrypt/decrypt C2 messages. Note that the Sliver KEM is only used over insecure protocols such as HTTP and DNS, and does not affect mTLS or Wireguard.
The issue was addressed by switching to a combination age for the KEM and HMAC-SHA2-256 to verify the implant.
More details: https://github.com/BishopFox/sliver/security/advisories/GHSA-8jxm-xp43-qh3q
Special thanks to Ting-Wei Hsieh from CHT Security Co. Ltd. for reporting the vulnerability.
migrate
to use process names (rkervella) #1223
DumpCookies
method (rkervella) #1158