ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Sliver C&C Connection

Risk Factors

The Sliver framework is a publicly available and well-known tool associated with pen testing, security assessments, and persistent planned attacks. Command-and-control (C&C) connections generated by Sliver indicate that an attacker could remotely control a device and gain an entry point for further attacks on the network.

Category

Command-and-Control
Detection diagram
Next in Command-and-Control: Spoofed TLS Certificate

Attack Background

The Sliver framework manages C&C communications with a malicious executable file called an implant. When a victim runs the executable file, the implant is installed on the victim and then acts as a shell for running commands. To initiate a C&C connection, the implant creates specially-designed HTTP GET and HTTP POST requests that are sent to the C&C server.

Mitigation Options

Quarantine the device while checking for the presence of a malicious executable, such as ONTEGRATED_SECOND.exe
Monitor port 443 for unusual network activity such as data exfiltration
Investigate unusual network activity such as lateral movement

MITRE ATT&CK ID

Associated content

Announcing The Forrester Wave™: Network Analysis And Visibility Solutions, Q4 2025

Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.

Report

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response — ExtraHop

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response

News

Detections

Visit this resource for more information.

Docs

The 2025 ExtraHop Global Threat Landscape Report: The Alarming Reality of Threat Actor Dwell Time and Deeper Network Access — ExtraHop

This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.

Blog

ExtraHop RevealX MITRE ATT&CK Coverage 2024 — ExtraHop

Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.

Blog

MITRE ATT&CK - Network Detection & Response with RevealX — ExtraHop

Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.

External
Periodic Table of Use Cases

What else can RevealX do for you?