Rapid7 Vulnerability & Exploit Database

Lansweeper Credential Collector

Back to Search

Lansweeper Credential Collector

Created
05/30/2018

Description

Lansweeper stores the credentials it uses to scan the computers in its Microsoft SQL database. The passwords are XTea-encrypted with a 68 character long key, in which the first 8 characters are stored with the password in the database and the other 60 is static. Lansweeper, by default, creates an MSSQL user "lansweeperuser" with the password is "mysecretpassword0*", and stores its data in a database called "lansweeperdb". This module will query the MSSQL database for the credentials.

Author(s)

  • sghctoma <tamas.szakaly@praudit.hu>
  • eq <balazs.bucsay@praudit.hu>
  • calderpwn <calderon@websec.mx>

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/gather/lansweeper_collector
msf auxiliary(lansweeper_collector) > show actions
    ...actions...
msf auxiliary(lansweeper_collector) > set ACTION < action-name >
msf auxiliary(lansweeper_collector) > show options
    ...show and set options...
msf auxiliary(lansweeper_collector) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;