标签 ‘reDuh’ 下的日志
内网渗透利器–reDuh(webshell跳板)简单使用说明
国外大牛的作品,偶顺手写了个使用说明。E文好的看原文 http://www.sensepost.com/research/reDuh/
这个工具可以把内网服务器的端口通过http/https隧道转发到本机,形成一个连通回路。用于目标服务器在内网或做了端口策略的情况下连接目标服务器内部开放端口。
本机——-客户端———(http隧道)———–服务端——————内网服务器
服务端是个webshell(针对不同服务器有aspx,php,jsp三个版本),客户端是java写的,本机执行最好装上JDK。
阅读全文 »
reDuh: Re-inventing TCP like its 1973!
reDuh was released as part of SensePost’s BlackHat USA 2008 talk on tunnelling data in and out of networks. Most external firewalls block all incoming sockets except for port 80/443. reDuh allows an attacker to use the compromised web server as a tunneling proxy into the internal network enviroment. reDuh encodes data into valid HTTP requests, which is then delivered to the server agent, decoded, and redirects the data to the various configured tunnels. reDuh is available in JSP/PHP/ASP.
主页:reDuh home page
下载地址:reDuhClient (the local proxy) | reDuhu Server Pages (JSP/PHP/ASP)
在 Way7T 那里看到的,原文题目为:超强的内网渗透跳板webshell。
Tags: reDuh, WebShell