-
|
Hello, If I configure Sliver to use mTLS for C2 communications, are there any specific fingerprints or characteristics (such as certificate details, JA3 hashes, or traffic patterns) that could make the traffic identifiable as Sliver C2 traffic? What would you recommend to reduce the risk of Sliver traffic being detected or fingerprinted when using mTLS? Thank you! |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
|
mTLS is designed for security, stability, and speed, and is not recommended for operations where stealthy network traffic is a significant priority. Recommend using HTTP/S for "stealthy" comms. |
Beta Was this translation helpful? Give feedback.
mTLS is designed for security, stability, and speed, and is not recommended for operations where stealthy network traffic is a significant priority. Recommend using HTTP/S for "stealthy" comms.