reDuh – TCP Redirection over HTTP

Use Netsparker


What Does reDuh Do?

reDuh is actually a tool that can be used to create a TCP circuit through validly formed HTTP requests.

Essentially this means that if we can upload a JSP/PHP/ASP page on a server, we can connect to hosts behind that server trivially

What is it for?

a) Bob.Hacker has the ability to upload / create a JSP page on the remote server

b) Bob.Hacker wishes to make an RDP connection to the server term-serv.victim.com (visible to the web-server behind the firewall)

c) The firewall permits HTTP traffic to the webserver but denies everything else

d) Bob.Hacker uploads reDuh.jsp to http://example.xom/uploads/reDuh.jsp

e) Bob.Hacker runs reDuhClient on his machine and points it to the page: $ java reDuhClient ubuntoo.victim.com 80 /uploads/reDuh.jsp


f) Bob.Hacker administers reDuhClient by connecting to its management port (1010 by default)

g) Once connected, Bob.Hacker types: [createTunnel]1234:term-serv.victim.com:3389

h) Now Bob.Hacker launches his RDP client, and aims it at localhost:1234

reDuhClient and reDuh.jsp will happily shunt TCP until they are killed..

The system can handle multiple connections, so while RDP is running, we can use the management connection (on port 1010) again, and request [createTunnel]5555:sshd.victim.com:22

Bob.Hacker can now ssh to localhost on port 5555 to access the sshd on sshd.victim.com (while still running his RDP session)

You can download reDuh here:

Download reDuhClient (the local proxy)
Download reDuhu Server Pages (JSP/PHP/ASP)

Or read more here.

Posted in: Hacking Tools, Networking Hacking

, , ,


Latest Posts:


Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.
Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.
testssl.sh - Test SSL Security Including Ciphers, Protocols & Detect Flaws testssl.sh – Test SSL Security Including Ciphers, Protocols & Detect Flaws
testssl.sh is a free command line tool to test SSL security, it checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more.


10 Responses to reDuh – TCP Redirection over HTTP

  1. aol September 10, 2008 at 1:10 pm #

    excellent tool – thank you

  2. dave September 10, 2008 at 2:41 pm #

    wow, fantastic tool…

  3. sun September 11, 2008 at 6:07 am #

    not working..

    ./java reDuhClient ipaddress/reDuh.aspx
    Usage: java reDuhClient <linkToReDuh.jsp
    e.g java reDuhClient http://www.compromised.com 80 /secretDirectory/reDuh.jsp

    what’s wrong ?

  4. DG September 12, 2008 at 7:09 pm #

    You can’t have “http://” in your IP address

    java reDuhClient http://www.compromised.com 80 /secretDirectory/reDuh.jsp

  5. Gilberto September 13, 2008 at 12:50 am #

    hahaha nice t00l…

  6. glenn September 17, 2008 at 8:06 pm #

    …and I hear the author’s pretty good looking too ;)

  7. SpikyHead September 21, 2008 at 6:27 am #

    Nice piece of code.. great work

  8. Nikola September 25, 2008 at 10:32 am #

    @sub, usage goes
    java reDuhClient http://www.compromised.com 80 /dir/reDuh.jsp

    You shouldn’t type in protocol. Additionally, aspx version doesn’t work, it needs to implement another function. I’ve sent fixed one to reDuh guys but got no reply yet.

  9. Nikola September 25, 2008 at 10:33 am #

    @sun, I see now that CMS adds protocol :) Sorry

  10. lowkey November 13, 2008 at 4:32 pm #

    Are you not assuming the presence of a jvm and servlet runer on the compromised box?