Inflearn brand logo image
Inflearn brand logo image
Inflearn brand logo image
Security & Network

/

Computer Security

PNT - Pivoting and Tunneling

The PNT course is a hands-on course designed to follow the BHPT course and teach the concepts of pivoting and tunneling, which are necessary for lateral movement within a network. Students will learn pivoting techniques to bypass firewalls by manipulating network traffic and learn how to cross boundaries in various network environments through a practical lab.

(4.8) 12 reviews

181 learners

  • redraccoon
보안실습
이론 실습 모두
Penetration Testing
security training
network-security
cybersecurity

Reviews from Early Learners

What you will learn!

  • pivoting

  • tunneling

  • Simulated hacking

I've managed to escalate privileges on the target host with a follow-up attack, but what should I do if I want to expand the attack scope to other networks? 🤔


In Red Raccoon's BHPT lecture, we learned about the mock hacking process against a single host. However, the real IT infrastructure is not made up of a single host, but of thousands, tens of thousands, and hundreds of thousands of hosts and hundreds of thousands of networks. In addition, "network separation" is used to separate networks and control access to specific networks only to authorized IP addresses, networks, hosts, users, software, ports, and protocols.

How should we conduct mock hacking/red teaming in this network isolation situation?

Attack scenario using pivoting during network separation

In this Red Raccoon Pivoting and Tunneling (PNT) lecture, you will learn about the concepts of pivoting and tunneling in the lateral movement stage of the attacker's life cycle in a network separation environment as mentioned above, understand pivoting attack techniques according to the target network environment when moving within a network, and then directly perform the relevant techniques through hands-on practice based on the concepts you have learned.




You can think of this lecture as one that teaches you the pivoting and tunneling techniques used when moving internally or laterally in a network, as shown in the diagram below.



Features of this course

📌 Learning based on real attack scenarios

📌 Introduction to various pivoting techniques and tunneling tools

📌 Strengthening practical suitability in Red Raccoon’s hands-on training environment

📌 Learning a systematic approach from the attacker's perspective

I recommend this to these people

I can attack one host, but I don't know what to do next.

The BHPT lecture only targeted one host... I don't know what to study next

I do CTF and bug bounties from time to time. Is this right?
Anyone who wants to experience realistic mock hacking targeting networks beyond CTF or web mock hacking

I understand the theory, but I don't know how to apply it in practice.
I've heard of pivoting and tunneling, but I'm curious about what kind of situations they're actually used in.

After class

  • Learn in depth the techniques for performing lateral movement across network boundaries and understand how they can be utilized through real-world examples.

  • Develop problem-solving skills in real-world situations by applying pivoting and tunneling techniques directly through in-class exercises.

  • The Red Raccoon community provides opportunities to connect with fellow students from diverse backgrounds and receive direct feedback from industry experts.

  • Learn how to identify vulnerabilities in network segmentation and defense systems from an attacker's perspective and strengthen your defense strategy based on this.

PNT Lecture Structure


The one and only hands-on lab created by Red Raccoon

We provide hands-on labs produced directly by Red Raccoon 24 hours a day through Discord.

Unlimited Red Raccoon Guidebook Period

In addition to the lecture videos, it also contains lecture and practical content.
Unlimited PNT full guidebook


Gain practical experience through self-check assignments

Added fun by finding hidden flags here and there



Final task

The final assignment will allow you to review what you have learned so far.


Red Raccoon Academy Faculty

Choi

  • Currently working as a red team operator at a major domestic company, conducting attacker simulation work

  • Former Fortune 100 US headquarters, conducting internal network, external network, and web mock hacking for companies around the world

  • Create and run Blue Team Workshop + Red Team Workshop at Defcon 30, Defcon 31

  • Korea's first offensive security open source Wikipedia operation ( redteam.com )

  • Global CPTC(Collegiate Penetration Testing Competition) 2020 - 1st Place, Team Leader

  • Certifications: OSCP, CRTO, CRTL, EvilGinx2 Phishing Mastery Course, Breaching the Cloud


Groot

  • Current Mock Hacker at TUV SUD & Cyber Security Bootcamp Lead Instructor

  • Former CrowdStrike Senior Cyber Security Intel Researcher

  • Former CyberCX MSSP SOC Team Leader, Senior Simulator Hacker

  • Experience in various domains such as Blue Team, Red Team, and Intel Researcher

  • Certifications: OSCP, CRTO, CREST, Security Product Vendor Certifications (CrowdStrike, LogRhythm, Okta, Microsoft Security, Netskope, etc.)

Player Knowledge and Notes

  • This lecture is a compilation of techniques used in internal network mock hacking or actual red teaming, so intermediate or higher skills are required.

  • This lecture is a follow-up lecture to Red Raccoon BHPT . We recommend that you take BHPT first and then take this lecture.

Recommended for
these people

Who is this course right for?

  • Those who want to experience red team work in the field but lack opportunities to practice pivoting or tunneling

  • External penetration testing is something I've experienced, but I'd like to expand the scope to include internal network penetration.

  • Security consultants who need to develop penetration testing strategies for situations where network access is restricted, depending on the environment of various clients

  • Infrastructure/network administrators who want to understand how the company's security policies and network defense systems can be bypassed from the perspective of an actual attacker

  • Security operations center (SOC) analysts and threat hunting specialists who want to improve real-time analysis and threat detection by understanding the propagation paths and lateral movement techniques of internal attacks

Need to know before starting?

  • Simulated hacking

  • Basic Network Theory

  • BHPT

Hello
This is

878

Learners

72

Reviews

5

Answers

4.9

Rating

3

Courses

레드라쿤 커뮤니티

레드라쿤은 사이버 보안 커뮤니티로, 사이버 보안 해킹 기술 강의 뿐만 아니라 사이버 보안 주제/팁/노하우 등을 공유합니다.

레드라쿤 웹사이트 목록

 

레드라쿤 아카데미 강사진

초이 (Choi)

  • 現 국내 대기업 레드팀 오퍼레이터 - 공격자 시뮬레이션, 침투 업무 수행

  • Fortune 100에서 미국 및 전세계 기업들을 상대로 내부망, 외부망, 웹 모의해킹 업무 수행

  • Defcon 30, Defcon 31에서 블루팀 워크샵 + 레드팀 워크샵 제작 및 진행

  • 한국 최초의 오펜시브 시큐리티 오픈소스 위키피디아 운영 (레드팀.com)

  • Global CPTC(Collegiate Penetration Testing Competition) 2020 - 1등, 팀장

  • 자격증: OSCP, CRTO, CRTL, EvilGinx2 피싱 마스터리 코스, Breaching the Cloud


그루트 (Groot)

  • 現 선임 사이버 보안 엔지니어 & 사이버 보안 부트캠프 리드 강사

  • 前 CrowdStrike 선임 사이버 보안 인텔 연구원

  • 前 CyberCX MSSP SOC 팀장, 선임 모의 해커

  • 블루팀, 레드팀, 인텔 연구원등 다양한 도메인에서 경력 보유

  • 자격증: OSCP, CRTO, CREST, 보안 제품 벤더 자격증 (CrowdStrike, LogRhythm, Okta, Microsoft Security, Netskope등)

     

 

 

Curriculum

All

36 lectures ∙ (3hr 48min)

Published: 
Last updated: 

Reviews

All

12 reviews

4.8

12 reviews

  • ss1064wp4801님의 프로필 이미지
    ss1064wp4801

    Reviews 2

    Average Rating 5.0

    5

    31% enrolled

    • jingu2225079님의 프로필 이미지
      jingu2225079

      Reviews 4

      Average Rating 3.0

      3

      31% enrolled

      • hyungsulee7798님의 프로필 이미지
        hyungsulee7798

        Reviews 1

        Average Rating 5.0

        5

        31% enrolled

        It's good how it keeps getting interesting.

        • redraccoon
          Instructor

          Thank you !

      • hjso12362님의 프로필 이미지
        hjso12362

        Reviews 5

        Average Rating 5.0

        5

        100% enrolled

        • hopefordream님의 프로필 이미지
          hopefordream

          Reviews 17

          Average Rating 4.8

          5

          100% enrolled

          It was a good lecture

          $152.90

          redraccoon's other courses

          Check out other courses by the instructor!

          Similar courses

          Explore other courses in the same field!