reDuh – TCP Redirection over HTTP

The New Acunetix V12 Engine


What Does reDuh Do?

reDuh is actually a tool that can be used to create a TCP circuit through validly formed HTTP requests.

Essentially this means that if we can upload a JSP/PHP/ASP page on a server, we can connect to hosts behind that server trivially

What is it for?

a) Bob.Hacker has the ability to upload / create a JSP page on the remote server

b) Bob.Hacker wishes to make an RDP connection to the server term-serv.victim.com (visible to the web-server behind the firewall)

c) The firewall permits HTTP traffic to the webserver but denies everything else

d) Bob.Hacker uploads reDuh.jsp to http://example.xom/uploads/reDuh.jsp

e) Bob.Hacker runs reDuhClient on his machine and points it to the page: $ java reDuhClient ubuntoo.victim.com 80 /uploads/reDuh.jsp


f) Bob.Hacker administers reDuhClient by connecting to its management port (1010 by default)

g) Once connected, Bob.Hacker types: [createTunnel]1234:term-serv.victim.com:3389

h) Now Bob.Hacker launches his RDP client, and aims it at localhost:1234

reDuhClient and reDuh.jsp will happily shunt TCP until they are killed..

The system can handle multiple connections, so while RDP is running, we can use the management connection (on port 1010) again, and request [createTunnel]5555:sshd.victim.com:22

Bob.Hacker can now ssh to localhost on port 5555 to access the sshd on sshd.victim.com (while still running his RDP session)

You can download reDuh here:

Download reDuhClient (the local proxy)
Download reDuhu Server Pages (JSP/PHP/ASP)

Or read more here.

Posted in: Hacking Tools, Networking Hacking

, , ,


Latest Posts:


testssl.sh - Test SSL Security Including Ciphers, Protocols & Detect Flaws testssl.sh – Test SSL Security Including Ciphers, Protocols & Detect Flaws
testssl.sh is a free command line tool to test SSL security, it checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more.
Four Year Old libSSH Bug Leaves Servers Wide Open Four Year Old libssh Bug Leaves Servers Wide Open
A fairly serious 4-year old libssh bug has left servers vulnerable to remote compromise, fortunately, the attack surface isn't that big as neither OpenSSH or the GitHub implementation are affected.
CHIPSEC - Platform Security Assessment Framework CHIPSEC – Platform Security Assessment Framework For Firmware Hacking
CHIPSEC is a platform security assessment framework for PCs including hardware, system firmware (BIOS/UEFI), and platform components for firmware hacking.
How To Recover When Your Website Got Hacked How To Recover When Your Website Got Hacked
The array of easily available Hacking Tools out there now is astounding, combined with self-propagating malware, people often come to me when their website got hacked and they don't know what to do, or even where to start.
HTTrack - Website Downloader Copier & Site Ripper Download HTTrack – Website Downloader Copier & Site Ripper Download
HTTrack is a free and easy-to-use offline browser utility which acts as a website downloader and a site ripper for copying websites and downloading them for offline viewing.
sshLooter - Script To Steal SSH Passwords sshLooter – Script To Steal SSH Passwords
sshLooter is a Python script using a PAM module to steal SSH passwords by logging the password and notifying the admin of the script via Telegram when a user logs in.


10 Responses to reDuh – TCP Redirection over HTTP

  1. aol September 10, 2008 at 1:10 pm #

    excellent tool – thank you

  2. dave September 10, 2008 at 2:41 pm #

    wow, fantastic tool…

  3. sun September 11, 2008 at 6:07 am #

    not working..

    ./java reDuhClient ipaddress/reDuh.aspx
    Usage: java reDuhClient <linkToReDuh.jsp
    e.g java reDuhClient http://www.compromised.com 80 /secretDirectory/reDuh.jsp

    what’s wrong ?

  4. DG September 12, 2008 at 7:09 pm #

    You can’t have “http://” in your IP address

    java reDuhClient http://www.compromised.com 80 /secretDirectory/reDuh.jsp

  5. Gilberto September 13, 2008 at 12:50 am #

    hahaha nice t00l…

  6. glenn September 17, 2008 at 8:06 pm #

    …and I hear the author’s pretty good looking too ;)

  7. SpikyHead September 21, 2008 at 6:27 am #

    Nice piece of code.. great work

  8. Nikola September 25, 2008 at 10:32 am #

    @sub, usage goes
    java reDuhClient http://www.compromised.com 80 /dir/reDuh.jsp

    You shouldn’t type in protocol. Additionally, aspx version doesn’t work, it needs to implement another function. I’ve sent fixed one to reDuh guys but got no reply yet.

  9. Nikola September 25, 2008 at 10:33 am #

    @sun, I see now that CMS adds protocol :) Sorry

  10. lowkey November 13, 2008 at 4:32 pm #

    Are you not assuming the presence of a jvm and servlet runer on the compromised box?