reDuh – TCP Redirection over HTTP

Keep on Guard!


What Does reDuh Do?

reDuh is actually a tool that can be used to create a TCP circuit through validly formed HTTP requests.

Essentially this means that if we can upload a JSP/PHP/ASP page on a server, we can connect to hosts behind that server trivially

What is it for?

a) Bob.Hacker has the ability to upload / create a JSP page on the remote server

b) Bob.Hacker wishes to make an RDP connection to the server term-serv.victim.com (visible to the web-server behind the firewall)

c) The firewall permits HTTP traffic to the webserver but denies everything else

d) Bob.Hacker uploads reDuh.jsp to http://example.xom/uploads/reDuh.jsp

e) Bob.Hacker runs reDuhClient on his machine and points it to the page: $ java reDuhClient ubuntoo.victim.com 80 /uploads/reDuh.jsp


f) Bob.Hacker administers reDuhClient by connecting to its management port (1010 by default)

g) Once connected, Bob.Hacker types: [createTunnel]1234:term-serv.victim.com:3389

h) Now Bob.Hacker launches his RDP client, and aims it at localhost:1234

reDuhClient and reDuh.jsp will happily shunt TCP until they are killed..

The system can handle multiple connections, so while RDP is running, we can use the management connection (on port 1010) again, and request [createTunnel]5555:sshd.victim.com:22

Bob.Hacker can now ssh to localhost on port 5555 to access the sshd on sshd.victim.com (while still running his RDP session)

You can download reDuh here:

Download reDuhClient (the local proxy)
Download reDuhu Server Pages (JSP/PHP/ASP)

Or read more here.

Posted in: Hacking Tools, Networking Hacking

, , ,


Latest Posts:


What You Need To Know About KRACK WPA2 Wi-Fi Attack What You Need To Know About KRACK WPA2 Wi-Fi Attack
The Internet has been blowing up in the past week about the KRACK WPA2 attack that is extremely widespread and is a flaw in the Wi-Fi standard itself.
Spaghetti Download - Web Application Security Scanner Spaghetti Download – Web Application Security Scanner
Spaghetti is an Open-source Web Application Security Scanner, it is designed to find various default and insecure files, configurations etc.
Taringa Hack - 27 Million User Records Leaked Taringa Hack – 27 Million User Records Leaked
The Taringa hack is actually one of the biggest leaks of the year with 27 million weakly hashed passwords breached, but it's not often covered in the West.
A2SV - Auto Scanning SSL Vulnerability Tool For Poodle & Heartbleed A2SV – Auto Scanning SSL Vulnerability Tool For Poodle & Heartbleed
A2SV is a Python-based SSL Vulnerability focused tool that allows for auto-scanning and detection of the common and well-known SSL Vulnerabilities.
VHostScan - Virtual Host Scanner With Alias & Catch-All Detection VHostScan – Virtual Host Scanner With Alias & Catch-All Detection
VHostScan is a Python-based virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
Equifax Hack Blamed On Single Employee Equifax Hack Blamed On Single Employee
We wrote about the Equifax Hack, Data Breach and Leak last month, which happened due to a flaw in Apache Struts that for some reason hadn't been patched.


10 Responses to reDuh – TCP Redirection over HTTP

  1. aol September 10, 2008 at 1:10 pm #

    excellent tool – thank you

  2. dave September 10, 2008 at 2:41 pm #

    wow, fantastic tool…

  3. sun September 11, 2008 at 6:07 am #

    not working..

    ./java reDuhClient ipaddress/reDuh.aspx
    Usage: java reDuhClient <linkToReDuh.jsp
    e.g java reDuhClient http://www.compromised.com 80 /secretDirectory/reDuh.jsp

    what’s wrong ?

  4. DG September 12, 2008 at 7:09 pm #

    You can’t have “http://” in your IP address

    java reDuhClient http://www.compromised.com 80 /secretDirectory/reDuh.jsp

  5. Gilberto September 13, 2008 at 12:50 am #

    hahaha nice t00l…

  6. glenn September 17, 2008 at 8:06 pm #

    …and I hear the author’s pretty good looking too ;)

  7. SpikyHead September 21, 2008 at 6:27 am #

    Nice piece of code.. great work

  8. Nikola September 25, 2008 at 10:32 am #

    @sub, usage goes
    java reDuhClient http://www.compromised.com 80 /dir/reDuh.jsp

    You shouldn’t type in protocol. Additionally, aspx version doesn’t work, it needs to implement another function. I’ve sent fixed one to reDuh guys but got no reply yet.

  9. Nikola September 25, 2008 at 10:33 am #

    @sun, I see now that CMS adds protocol :) Sorry

  10. lowkey November 13, 2008 at 4:32 pm #

    Are you not assuming the presence of a jvm and servlet runer on the compromised box?