πŸ§ͺ Laudanum – "One Web Shell to Rule Them All"

πŸ” What is Laudanum?

  • Laudanum is a collection of pre-built injectable web shell files.

  • Supports various web technologies: ASP, ASPX, PHP, JSP, etc.

  • Built-in to Kali Linux and Parrot OS.

  • Can be used for:

    • Uploading reverse shells

    • Executing OS commands from the browser

    • Gaining remote code execution (RCE)


πŸ“ Location

On Kali/Parrot OS:

/usr/share/laudanum

πŸ’‘ Usage Considerations

  • Most shells work as-is, but some require:

    • Modifying the attacker’s IP address (for reverse shells).

    • Removing ASCII art/comments to evade detection.

  • Always read the comments in the file before use.


πŸ§ͺ Laudanum Demonstration Steps

1️⃣ Add Entry to /etc/hosts:

Edit /etc/hosts on your attacking VM or Pwnbox to associate the target hostname:

Add:


2️⃣ Copy & Modify the Shell

Choose and copy a web shell to your working directory for editing:

Edit line 59 and set your attacking IP:

πŸ›‘οΈ Optional: Remove comments and ASCII art to reduce AV detection.


3️⃣ Upload the Shell

Go to the web app's Upload Section (at the bottom of the status page) and upload demo.aspx.

βœ… A successful upload should display the upload path (e.g., \\files\demo.aspx).


4️⃣ Access the Web Shell

Navigate to the uploaded file using a browser:

🧠 Note: Use \\ (which auto-converts to / in the browser). The web server may:

  • Keep the original filename

  • Obfuscate it (random strings)

  • Sanitize or restrict access


5️⃣ Use the Shell

Laudanum provides a form interface where you can enter system commands.

Example usage:

Click Submit Query to run.


🧰 Summary of Features

  • βœ… Built-in HTTP command interface

  • βœ… Preconfigured for common use cases

  • βœ… Works with minimal tweaking

  • ❗ May be detectable by AV/EDR β†’ remove obvious signatures


πŸš€ Next Step

Use the web shell to:

  • Run recon (e.g., whoami, ipconfig, systeminfo)

  • Upload a reverse shell payload to gain persistent interactive access

  • Enumerate services and users before privilege escalation


Let me know if you'd like a cheatsheet of common commands to run from the Laudanum shell or help upgrading it to a reverse shell session.

Last updated