reDuh – TCP Redirection over HTTP


What Does reDuh Do?

reDuh is actually a tool that can be used to create a TCP circuit through validly formed HTTP requests.

Essentially this means that if we can upload a JSP/PHP/ASP page on a server, we can connect to hosts behind that server trivially

What is it for?

a) Bob.Hacker has the ability to upload / create a JSP page on the remote server

b) Bob.Hacker wishes to make an RDP connection to the server term-serv.victim.com (visible to the web-server behind the firewall)

c) The firewall permits HTTP traffic to the webserver but denies everything else

d) Bob.Hacker uploads reDuh.jsp to http://example.xom/uploads/reDuh.jsp

e) Bob.Hacker runs reDuhClient on his machine and points it to the page: $ java reDuhClient ubuntoo.victim.com 80 /uploads/reDuh.jsp


f) Bob.Hacker administers reDuhClient by connecting to its management port (1010 by default)

g) Once connected, Bob.Hacker types: [createTunnel]1234:term-serv.victim.com:3389

h) Now Bob.Hacker launches his RDP client, and aims it at localhost:1234

reDuhClient and reDuh.jsp will happily shunt TCP until they are killed..

The system can handle multiple connections, so while RDP is running, we can use the management connection (on port 1010) again, and request [createTunnel]5555:sshd.victim.com:22

Bob.Hacker can now ssh to localhost on port 5555 to access the sshd on sshd.victim.com (while still running his RDP session)

You can download reDuh here:

Download reDuhClient (the local proxy)
Download reDuhu Server Pages (JSP/PHP/ASP)

Or read more here.

Posted in: Hacking Tools, Networking Hacking Tools

, , ,


Latest Posts:


SharpHose - Asynchronous Password Spraying Tool SharpHose – Asynchronous Password Spraying Tool
SharpHose is an asynchronous password spraying tool in C# for Windows environments that takes into consideration fine-grained password policies and can be run over Cobalt Strike's execute-assembly.
Axiom - Pen-Testing Server For Collecting Bug Bounties Axiom – Pen-Testing Server For Collecting Bug Bounties
Project Axiom is a set of utilities for managing a small dynamic infrastructure setup for bug bounty, basically a pen-testing server out of the box with 1-line.
Quasar RAT - Windows Remote Administration Tool Quasar RAT – Windows Remote Administration Tool
Quasar is a fast and light-weight Windows remote administration tool coded in C#. Used for user support through day-to-day administrative work to monitoring.
Pingcastle - Active Directory Security Assessment Tool Pingcastle – Active Directory Security Assessment Tool
PingCastle is a Active Directory Security Assessment Tool designed to quickly assess the Active Directory security level based on a risk and maturity framework.
Second Order - Subdomain Takeover Scanner Tool Second Order – Subdomain Takeover Scanner Tool
Second Order Subdomain Takeover Scanner Tool scans web apps for second-order subdomain takeover by crawling the application and collecting URLs (and other data)
Binwalk - Firmware Security Analysis & Extraction Tool Binwalk – Firmware Security Analysis & Extraction Tool
Binwalk is a fast and easy to use Python-based firmware security analysis tool that allows for firmware analysis, reverse engineering & extracting of firmware.


10 Responses to reDuh – TCP Redirection over HTTP

  1. aol September 10, 2008 at 1:10 pm #

    excellent tool – thank you

  2. dave September 10, 2008 at 2:41 pm #

    wow, fantastic tool…

  3. sun September 11, 2008 at 6:07 am #

    not working..

    ./java reDuhClient ipaddress/reDuh.aspx
    Usage: java reDuhClient <linkToReDuh.jsp
    e.g java reDuhClient http://www.compromised.com 80 /secretDirectory/reDuh.jsp

    what’s wrong ?

  4. DG September 12, 2008 at 7:09 pm #

    You can’t have “http://” in your IP address

    java reDuhClient http://www.compromised.com 80 /secretDirectory/reDuh.jsp

  5. Gilberto September 13, 2008 at 12:50 am #

    hahaha nice t00l…

  6. glenn September 17, 2008 at 8:06 pm #

    …and I hear the author’s pretty good looking too ;)

  7. SpikyHead September 21, 2008 at 6:27 am #

    Nice piece of code.. great work

  8. Nikola September 25, 2008 at 10:32 am #

    @sub, usage goes
    java reDuhClient http://www.compromised.com 80 /dir/reDuh.jsp

    You shouldn’t type in protocol. Additionally, aspx version doesn’t work, it needs to implement another function. I’ve sent fixed one to reDuh guys but got no reply yet.

  9. Nikola September 25, 2008 at 10:33 am #

    @sun, I see now that CMS adds protocol :) Sorry

  10. lowkey November 13, 2008 at 4:32 pm #

    Are you not assuming the presence of a jvm and servlet runer on the compromised box?