강의

멘토링

커뮤니티

BEST
Security & Network

/

Computer Security

PNT - Pivoting and Tunneling

The PNT course is a hands-on course designed to follow the BHPT course and teach the concepts of pivoting and tunneling, which are necessary for lateral movement within a network. Students will learn pivoting techniques to bypass firewalls by manipulating network traffic and learn how to cross boundaries in various network environments through a practical lab.

(4.7) 28 reviews

287 learners

Level Intermediate

Course period Unlimited

  • redraccoon
Penetration Testing
Penetration Testing
security training
security training
network-security
network-security
cybersecurity
cybersecurity
Penetration Testing
Penetration Testing
security training
security training
network-security
network-security
cybersecurity
cybersecurity

Reviews from Early Learners

Reviews from Early Learners

4.7

5.0

몽상가

22% enrolled

Choi and Groot. How are you? Thank you for giving me a platform to grow even more, and I will enjoy it.

5.0

김수영

100% enrolled

The best

5.0

공익선

31% enrolled

The lecture is very informative.

What you will gain after the course

  • pivoting

  • tunneling

  • Simulated hacking

I've managed to escalate privileges on the target host with a follow-up attack, but what should I do if I want to expand the attack scope to other networks? 🤔


In Red Raccoon's BHPT lecture, we learned about the mock hacking process against a single host. However, the real IT infrastructure is not made up of a single host, but of thousands, tens of thousands, and hundreds of thousands of hosts and hundreds of thousands of networks. In addition, "network separation" is used to separate networks and control access to specific networks only to authorized IP addresses, networks, hosts, users, software, ports, and protocols.

How should we conduct mock hacking/red teaming in this network isolation situation?

Attack scenario using pivoting during network separation

In this Red Raccoon Pivoting and Tunneling (PNT) lecture, you will learn about the concepts of pivoting and tunneling in the lateral movement stage of the attacker's life cycle in a network separation environment as mentioned above, understand pivoting attack techniques according to the target network environment when moving within a network, and then directly perform the relevant techniques through hands-on practice based on the concepts you have learned.




You can think of this lecture as one that teaches you the pivoting and tunneling techniques used when moving internally or laterally in a network, as shown in the diagram below.



Features of this course

📌 Learning based on real attack scenarios

📌 Introduction to various pivoting techniques and tunneling tools

📌 Strengthening practical suitability in Red Raccoon’s hands-on training environment

📌 Learning a systematic approach from the attacker's perspective

I recommend this to these people

I can attack one host, but I don't know what to do next.

The BHPT lecture only targeted one host... I don't know what to study next

I do CTF and bug bounties from time to time. Is this right?
Anyone who wants to experience realistic mock hacking targeting networks beyond CTF or web mock hacking

I understand the theory, but I don't know how to apply it in practice.
I've heard of pivoting and tunneling, but I'm curious about what kind of situations they're actually used in.

After class

  • Learn in depth the techniques for performing lateral movement across network boundaries and understand how they can be utilized through real-world examples.

  • Develop problem-solving skills in real-world situations by applying pivoting and tunneling techniques directly through in-class exercises.

  • The Red Raccoon community provides opportunities to connect with fellow students from diverse backgrounds and receive direct feedback from industry experts.

  • Learn how to identify vulnerabilities in network segmentation and defense systems from an attacker's perspective and strengthen your defense strategy based on this.

PNT Lecture Structure


The one and only hands-on lab created by Red Raccoon

We provide hands-on labs produced directly by Red Raccoon 24 hours a day through Discord.

Unlimited Red Raccoon Guidebook Period

In addition to the lecture videos, it also contains lecture and practical content.
Unlimited PNT full guidebook


Gain practical experience through self-check assignments

Added fun by finding hidden flags here and there



Final task

The final assignment will allow you to review what you have learned so far.


Red Raccoon Academy Faculty

Choi

  • Currently working as a red team operator at a major domestic company, conducting attacker simulation work

  • Former Fortune 100 US headquarters, conducting internal network, external network, and web mock hacking for companies around the world

  • Create and run Blue Team Workshop + Red Team Workshop at Defcon 30, Defcon 31

  • Korea's first offensive security open source Wikipedia operation ( redteam.com )

  • Global CPTC(Collegiate Penetration Testing Competition) 2020 - 1st Place, Team Leader

  • Certifications: OSCP, CRTO, CRTL, EvilGinx2 Phishing Mastery Course, Breaching the Cloud


Groot

  • Current Mock Hacker at TUV SUD & Cyber Security Bootcamp Lead Instructor

  • Former CrowdStrike Senior Cyber Security Intel Researcher

  • Former CyberCX MSSP SOC Team Leader, Senior Simulator Hacker

  • Experience in various domains such as Blue Team, Red Team, and Intel Researcher

  • Certifications: OSCP, CRTO, CREST, Security Product Vendor Certifications (CrowdStrike, LogRhythm, Okta, Microsoft Security, Netskope, etc.)

Player Knowledge and Notes

  • This lecture is a compilation of techniques used in internal network mock hacking or actual red teaming, so intermediate or higher skills are required.

  • This lecture is a follow-up lecture to Red Raccoon BHPT . We recommend that you take BHPT first and then take this lecture.

Recommended for
these people

Who is this course right for?

  • Those who want to experience red team work in the field but lack opportunities to practice pivoting or tunneling

  • External penetration testing is something I've experienced, but I'd like to expand the scope to include internal network penetration.

  • Security consultants who need to develop penetration testing strategies for situations where network access is restricted, depending on the environment of various clients

  • Infrastructure/network administrators who want to understand how the company's security policies and network defense systems can be bypassed from the perspective of an actual attacker

  • Security operations center (SOC) analysts and threat hunting specialists who want to improve real-time analysis and threat detection by understanding the propagation paths and lateral movement techniques of internal attacks

Need to know before starting?

  • Simulated hacking

  • Basic Network Theory

  • BHPT

Hello
This is

1,396

Learners

142

Reviews

12

Answers

4.9

Rating

3

Courses

Red Raccoon Community

Red Raccoon is a cybersecurity community that not only provides lectures on cybersecurity hacking techniques but also shares cybersecurity topics, tips, and know-how.

Red Raccoon Website List

 

Red Raccoon Academy Instructors

Choi

  • Current Red Team Operator at a major domestic corporation - performing adversary simulation and penetration testing

  • Former Fortune 100 professional, performed internal, external, and web penetration testing for companies in the U.S. and worldwide

  • Created and conducted Blue Team and Red Team workshops at Defcon 30 and Defcon 31

  • Operating Korea's first offensive security open-source Wikipedia (RedTeam.com)

  • Global CPTC (Collegiate Penetration Testing Competition) 2020 - 1st Place, Team Leader

  • Certifications: OSCP, CRTO, CRTL, EvilGinx2 Phishing Mastery Course, Breaching the Cloud


Groot

  • Current Senior Cybersecurity Engineer & Cybersecurity Bootcamp Lead Instructor

  • Former CrowdStrike Senior Cybersecurity Intelligence Researcher

  • Former CyberCX MSSP SOC Team Lead, Senior Penetration Tester

  • Possesses career experience in various domains, including Blue Team, Red Team, and Intel Researcher.

  • Certifications: OSCP, CRTO, CREST, security product vendor certifications (CrowdStrike, LogRhythm, Okta, Microsoft Security, Netskope, etc.)

     

 

 

Curriculum

All

36 lectures ∙ (3hr 48min)

Published: 
Last updated: 

Reviews

All

28 reviews

4.7

28 reviews

  • szen님의 프로필 이미지
    szen

    Reviews 6

    Average Rating 5.0

    5

    100% enrolled

    The best

    • muyaho76867님의 프로필 이미지
      muyaho76867

      Reviews 2

      Average Rating 4.0

      4

      31% enrolled

      • cybug님의 프로필 이미지
        cybug

        Reviews 2

        Average Rating 5.0

        5

        31% enrolled

        • icsunkong3543님의 프로필 이미지
          icsunkong3543

          Reviews 5

          Average Rating 5.0

          5

          31% enrolled

          The lecture is very informative.

          • cylee9999님의 프로필 이미지
            cylee9999

            Reviews 2

            Average Rating 5.0

            5

            100% enrolled

            It's difficult, but I think it will be very helpful Thank you

            $152.90

            redraccoon's other courses

            Check out other courses by the instructor!

            Similar courses

            Explore other courses in the same field!