PNT - Pivoting and Tunneling

The PNT course is a follow-up to the BHPT course, designed as a hands-on program where students learn the concepts of pivoting and tunneling required for lateral movement and perform lateral movement themselves through practice labs. Students will understand pivoting techniques to bypass firewalls by manipulating network traffic and master methods for crossing boundaries in various network environments.

(4.7) 30 reviews

300 learners

Level Intermediate

Course period Unlimited

Penetration Testing
Penetration Testing
security training
security training
network-security
network-security
cybersecurity
cybersecurity
Penetration Testing
Penetration Testing
security training
security training
network-security
network-security
cybersecurity
cybersecurity

Reviews from Early Learners

Reviews from Early Learners

4.7

5.0

몽상가

22% enrolled

Choi and Groot. How are you? Thank you for giving me a platform to grow even more, and I will enjoy it.

5.0

김수영

100% enrolled

The best

5.0

공익선

31% enrolled

The lecture is very informative.

What you will gain after the course

  • Pivoting

  • Tunneling

  • Penetration Testing

I've managed to escalate privileges on the target host through follow-up attacks... but what should I do when I want to expand the scope of the attack to other networks? 🤔


In Red Raccoon's BHPT course, we learned about the penetration testing process against a single host. However, real-world IT infrastructure consists of thousands, tens of thousands, or even hundreds of thousands of hosts and hundreds or thousands of networks, rather than just one host. Furthermore, "network separation" is used to isolate networks from one another, controlling access so that only authorized IP addresses, networks, hosts, users, software, ports, and protocols can access specific networks.

In such network isolation scenarios, how should penetration testing or Red Teaming be conducted?

Attack Scenarios Using Pivoting in Network Separation Environments

In this Red Raccoon Pivoting and Tunneling (PNT) course, you will learn the concepts of pivoting and tunneling during the lateral movement phase of the attacker lifecycle within the aforementioned network separation environments. After understanding pivoting attack techniques based on various target network environments during internal movement, you will perform these techniques yourself through hands-on exercises based on the concepts learned.




You can think of this as a lecture where you learn the pivoting and tunneling techniques used for lateral movement within internal networks, as shown in the diagram below.



Features of this course

📌Learning based on actual attack scenarios

📌Introduction to various pivoting techniques and tunneling tools

📌 Strengthening practical relevance within the Red Raccoon Hands-on lab environment

📌Learning a systematic approach from an attacker's perspective

Recommended for these types of people

I can perform an attack on a single host, but I don't know what to do next.

For those who have attacked only a single host in the BHPT course but don't know what to study next

I've been doing CTFs and bug bounties in my spare time... but is this the right way?
Those who want to go beyond CTFs or web penetration testing and experience realistic penetration testing targeting networksnhắm vào mục tiêu mạng

I understand the theory, but I'm not sure exactly how to apply it in practice.
Those who have heard of pivoting or tunneling but are curious about what real-world situations they are used in.

After taking this course, you will be able to

  • Learn in-depth techniques for performing lateral movement across network boundaries and understand how they can be applied through real-world cases.

  • Through hands-on exercises within the lecture, you will directly apply pivoting and tunneling techniques to develop problem-solving skills for real-world scenarios.

  • Provides opportunities to network with fellow students from diverse backgrounds through the Red Raccoon community and receive direct feedback from industry experts.

  • Identify vulnerabilities in network isolation and defense systems from an attacker's perspective, and learn how to strengthen defense strategies based on these findings.

PNT Course Curriculum


The one and only practice lab created directly by Red Raccoon

We provide 24-hour access to the practice labs directly created by Red Raccoon via Discord.

Unlimited access to the Red Raccoon guidebook

Unlimited access to the full PNT guidebook containing not only lecture videos but also lecture and practice content


Gain practical experience through Self-Check assignments

We added more fun by including hidden flags to find throughout the course.



Final Assignment

Through the final assignment, you can review everything you have learned so far once more.


Red Raccoon Academy Instructors

Choi

  • Currently working as a Red Team Operator at a major domestic corporation, conducting adversary simulation operations.

  • Former Fortune 100 US headquarters employee, conducted internal, external, and web penetration testing for global companies.

  • Created and conducted Blue Team and Red Team workshops at Defcon 30 and Defcon 31

  • Operating Korea's first offensive security open-source Wikipedia (RedTeam.com)

  • Global CPTC (Collegiate Penetration Testing Competition) 2020 - 1st Place, Team Leader

  • Certifications: OSCP, CRTO, CRTL, EvilGinx2 Phishing Mastery Course, Breaching the Cloud


Groot

  • Current Penetration Tester at TÜV SÜD & Lead Instructor for Cyber Security Bootcamp

  • Former CrowdStrike Senior Cybersecurity Intelligence Researcher

  • Former CyberCX MSSP SOC Team Lead, Senior Penetration Tester

  • Experience in various domains including Blue Team, Red Team, and Intel Researcher.

  • Certifications: OSCP, CRTO, CREST, Security Product Vendor Certifications (CrowdStrike, LogRhythm, Okta, Microsoft Security, Netskope, etc.)

     

Prerequisites and Important Notes

  • This course summarizes techniques used in internal network penetration testing or real-world Red Teaming, and therefore requires an intermediate level of skill or higher.

  • This course is a follow-up to Red Raccoon's BHPT , and it is recommended that you take BHPT first before taking this course.

Recommended for
these people

Who is this course right for?

  • Those who want to experience Red Teaming in the field but lack opportunities to practice pivoting or tunneling.

  • A security researcher who has experience in external penetration testing but wants to practically expand their scope to internal network penetration.

  • A security consultant who needs to develop penetration testing strategies for various client environments where network access is restricted.

  • Infrastructure/network administrators who want to understand how a company's security policies and network defense systems can be bypassed from the perspective of an actual attacker.

  • Security Operations Center (SOC) analysts or threat hunting experts who wish to improve real-time analysis and threat detection by understanding the propagation paths and lateral movement techniques of internal attacks.

Need to know before starting?

  • Penetration Testing

  • Basic Network Theory

  • BHPT

Hello
This is redraccoon

1,472

Learners

150

Reviews

12

Answers

4.9

Rating

3

Courses

Red Raccoon Community

Red Raccoon is a cybersecurity community that not only provides lectures on cybersecurity hacking techniques but also shares cybersecurity topics, tips, and know-how.

Red Raccoon Website List

 

Red Raccoon Academy Instructors

Choi

  • Current Red Team Operator at a major domestic corporation - performing adversary simulation and penetration testing

  • Former Fortune 100 professional, performed internal, external, and web penetration testing for companies in the U.S. and worldwide

  • Created and conducted Blue Team and Red Team workshops at Defcon 30 and Defcon 31

  • Operating Korea's first offensive security open-source Wikipedia (RedTeam.com)

  • Global CPTC (Collegiate Penetration Testing Competition) 2020 - 1st Place, Team Leader

  • Certifications: OSCP, CRTO, CRTL, EvilGinx2 Phishing Mastery Course, Breaching the Cloud


Groot

  • Current Senior Cybersecurity Engineer & Cybersecurity Bootcamp Lead Instructor

  • Former CrowdStrike Senior Cybersecurity Intelligence Researcher

  • Former CyberCX MSSP SOC Team Lead, Senior Penetration Tester

  • Possesses career experience in various domains, including Blue Team, Red Team, and Intel Researcher.

  • Certifications: OSCP, CRTO, CREST, security product vendor certifications (CrowdStrike, LogRhythm, Okta, Microsoft Security, Netskope, etc.)

     

 

 

More

Curriculum

All

36 lectures ∙ (3hr 49min)

Published: 
Last updated: 

Reviews

All

30 reviews

4.7

30 reviews

  • muyaho76867님의 프로필 이미지
    muyaho76867

    Reviews 2

    Average Rating 4.0

    4

    31% enrolled

    • vanhart님의 프로필 이미지
      vanhart

      Reviews 3

      Average Rating 5.0

      5

      31% enrolled

      • icsunkong3543님의 프로필 이미지
        icsunkong3543

        Reviews 5

        Average Rating 5.0

        5

        31% enrolled

        The lecture is very informative.

        • szen님의 프로필 이미지
          szen

          Reviews 6

          Average Rating 5.0

          5

          100% enrolled

          The best

          • cybug님의 프로필 이미지
            cybug

            Reviews 2

            Average Rating 5.0

            5

            31% enrolled

            Similar courses

            Explore other courses in the same field!

            $152.90