reDuh – TCP Redirection over HTTP

The New Acunetix V12 Engine


What Does reDuh Do?

reDuh is actually a tool that can be used to create a TCP circuit through validly formed HTTP requests.

Essentially this means that if we can upload a JSP/PHP/ASP page on a server, we can connect to hosts behind that server trivially

What is it for?

a) Bob.Hacker has the ability to upload / create a JSP page on the remote server

b) Bob.Hacker wishes to make an RDP connection to the server term-serv.victim.com (visible to the web-server behind the firewall)

c) The firewall permits HTTP traffic to the webserver but denies everything else

d) Bob.Hacker uploads reDuh.jsp to http://example.xom/uploads/reDuh.jsp

e) Bob.Hacker runs reDuhClient on his machine and points it to the page: $ java reDuhClient ubuntoo.victim.com 80 /uploads/reDuh.jsp


f) Bob.Hacker administers reDuhClient by connecting to its management port (1010 by default)

g) Once connected, Bob.Hacker types: [createTunnel]1234:term-serv.victim.com:3389

h) Now Bob.Hacker launches his RDP client, and aims it at localhost:1234

reDuhClient and reDuh.jsp will happily shunt TCP until they are killed..

The system can handle multiple connections, so while RDP is running, we can use the management connection (on port 1010) again, and request [createTunnel]5555:sshd.victim.com:22

Bob.Hacker can now ssh to localhost on port 5555 to access the sshd on sshd.victim.com (while still running his RDP session)

You can download reDuh here:

Download reDuhClient (the local proxy)
Download reDuhu Server Pages (JSP/PHP/ASP)

Or read more here.

Posted in: Hacking Tools, Networking Hacking

, , ,


Latest Posts:


BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.
Acunetix Vulnerability Scanner For Linux Now Available Acunetix Vulnerability Scanner For Linux Now Available
Acunetix Vulnerability Scanner For Linux is now available, now you get all of the functionality of Acunetix, with all of the dependability of Linux.
Gerix WiFi Cracker - Wireless 802.11 Hacking Tool With GUI Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI
Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).
Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.


10 Responses to reDuh – TCP Redirection over HTTP

  1. aol September 10, 2008 at 1:10 pm #

    excellent tool – thank you

  2. dave September 10, 2008 at 2:41 pm #

    wow, fantastic tool…

  3. sun September 11, 2008 at 6:07 am #

    not working..

    ./java reDuhClient ipaddress/reDuh.aspx
    Usage: java reDuhClient <linkToReDuh.jsp
    e.g java reDuhClient http://www.compromised.com 80 /secretDirectory/reDuh.jsp

    what’s wrong ?

  4. DG September 12, 2008 at 7:09 pm #

    You can’t have “http://” in your IP address

    java reDuhClient http://www.compromised.com 80 /secretDirectory/reDuh.jsp

  5. Gilberto September 13, 2008 at 12:50 am #

    hahaha nice t00l…

  6. glenn September 17, 2008 at 8:06 pm #

    …and I hear the author’s pretty good looking too ;)

  7. SpikyHead September 21, 2008 at 6:27 am #

    Nice piece of code.. great work

  8. Nikola September 25, 2008 at 10:32 am #

    @sub, usage goes
    java reDuhClient http://www.compromised.com 80 /dir/reDuh.jsp

    You shouldn’t type in protocol. Additionally, aspx version doesn’t work, it needs to implement another function. I’ve sent fixed one to reDuh guys but got no reply yet.

  9. Nikola September 25, 2008 at 10:33 am #

    @sun, I see now that CMS adds protocol :) Sorry

  10. lowkey November 13, 2008 at 4:32 pm #

    Are you not assuming the presence of a jvm and servlet runer on the compromised box?