[ Avaa Bypassed ]




Upload:

Command:

hmhc3928@3.141.197.1: ~ $
RESET MASTER;
CREATE USER user1@localhost IDENTIFIED BY 'secret';
CREATE USER user2@localhost IDENTIFIED BY 'secret';
SET PASSWORD FOR user1@localhost = PASSWORD('secret');
# Test the password is encrypted in binary log
# when granting privileges on tables.
GRANT UPDATE ON *.* TO user1@localhost IDENTIFIED BY 'secret' WITH GRANT OPTION;
GRANT UPDATE ON *.* /*before to*/TO/*after to*/ user1@localhost IDENTIFIED BY 'secret', user2@localhost IDENTIFIED BY 'secret2' /*before with*/WITH/*after with*/MAX_QUERIES_PER_HOUR 90;
GRANT UPDATE ON *.* /*before to*/TO/*after to*/ user1@localhost IDENTIFIED BY 'secret', user2@localhost IDENTIFIED BY 'secret2' /*before require*/REQUIRE SSL/*after require*/ /*before with*/WITH/*after with*/MAX_QUERIES_PER_HOUR 90;
GRANT UPDATE ON *.* TO user1@localhost IDENTIFIED BY 'secret', user2@localhost IDENTIFIED BY 'secret2';
REVOKE UPDATE ON *.* FROM user1@localhost, user2@localhost;
# Test the password is encrypted in binary log
# when granting privileges on procedure.
CREATE PROCEDURE p1() SQL SECURITY INVOKER SELECT 1;
GRANT EXECUTE ON PROCEDURE p1 TO user1@localhost IDENTIFIED BY 'secret', user2@localhost IDENTIFIED BY 'secret2' /*before with*/ WITH MAX_QUERIES_PER_HOUR 90;
GRANT EXECUTE ON PROCEDURE p1 /*before to*/TO/*after to*/ user1@localhost IDENTIFIED BY 'secret', user2@localhost IDENTIFIED BY 'secret2' /*before require*/REQUIRE SSL/*after require*/ /*before with*/WITH/*after with*/MAX_QUERIES_PER_HOUR 90;
GRANT EXECUTE ON PROCEDURE p1 TO user1@localhost IDENTIFIED BY 'secret', user2@localhost IDENTIFIED BY 'secret2';
REVOKE EXECUTE ON PROCEDURE p1 FROM user1@localhost, user2@localhost;
# Test the password is encrypted in binary log
# when granting privileges on function.
CREATE FUNCTION f1() RETURNS INT RETURN 123;
GRANT EXECUTE ON FUNCTION f1 /*before to*/TO/*after to*/ user1@localhost IDENTIFIED BY 'secret' /*!10000 , user2@localhost IDENTIFIED BY 'secret2' */ /*!99999 THIS_WOULD_BREAK */ /*before require*/REQUIRE SSL/*after require*/ /*before with*/WITH/*after with*/MAX_QUERIES_PER_HOUR 90;
REVOKE EXECUTE ON FUNCTION f1 FROM user1@localhost, user2@localhost;
DROP USER user1@localhost, user2@localhost;
DROP FUNCTION f1;
DROP PROCEDURE p1;
GRANT ALL on *.* TO test_user1 IDENTIFIED BY 'azundris1';
CREATE USER test_user2 IDENTIFIED BY 'azundris2';
CHANGE MASTER TO MASTER_PASSWORD='azundris3';
Warnings:
Note	1759	Sending passwords in plain text without SSL/TLS is extremely insecure.
Note	1760	Storing MySQL user name or password information in the master info repository is not secure and is therefore not recommended. Please consider using the USER and PASSWORD connection options for START SLAVE; see the 'START SLAVE Syntax' in the MySQL Manual for more information.
CREATE USER 'test_user4'@'localhost';
SET PASSWORD FOR 'test_user4'@'localhost' = PASSWORD('azundris4');
include/show_binlog_events.inc
Log_name	Pos	Event_type	Server_id	End_log_pos	Info
master-bin.000001	#	Query	#	#	use `test`; CREATE USER 'user1'@'localhost' IDENTIFIED BY PASSWORD '*14E65567ABDB5135D0CFD9A70B3032C179A49EE7'
master-bin.000001	#	Query	#	#	use `test`; CREATE USER 'user2'@'localhost' IDENTIFIED BY PASSWORD '*14E65567ABDB5135D0CFD9A70B3032C179A49EE7'
master-bin.000001	#	Query	#	#	use `test`; SET PASSWORD FOR 'user1'@'localhost'='*14E65567ABDB5135D0CFD9A70B3032C179A49EE7'
master-bin.000001	#	Query	#	#	use `test`; GRANT UPDATE ON *.* TO 'user1'@'localhost' IDENTIFIED BY PASSWORD '*14E65567ABDB5135D0CFD9A70B3032C179A49EE7' WITH GRANT OPTION
master-bin.000001	#	Query	#	#	use `test`; GRANT UPDATE ON *.* TO 'user1'@'localhost' IDENTIFIED BY PASSWORD '*14E65567ABDB5135D0CFD9A70B3032C179A49EE7','user2'@'localhost' IDENTIFIED BY PASSWORD '*305D7BCA9D65D8D5C4677F05CD2EA2EBE350158F' WITH MAX_QUERIES_PER_HOUR 90
master-bin.000001	#	Query	#	#	use `test`; GRANT UPDATE ON *.* TO 'user1'@'localhost' IDENTIFIED BY PASSWORD '*14E65567ABDB5135D0CFD9A70B3032C179A49EE7','user2'@'localhost' IDENTIFIED BY PASSWORD '*305D7BCA9D65D8D5C4677F05CD2EA2EBE350158F' REQUIRE SSL WITH MAX_QUERIES_PER_HOUR 90
master-bin.000001	#	Query	#	#	use `test`; GRANT UPDATE ON *.* TO 'user1'@'localhost' IDENTIFIED BY PASSWORD '*14E65567ABDB5135D0CFD9A70B3032C179A49EE7','user2'@'localhost' IDENTIFIED BY PASSWORD '*305D7BCA9D65D8D5C4677F05CD2EA2EBE350158F'
master-bin.000001	#	Query	#	#	use `test`; REVOKE UPDATE ON *.* FROM user1@localhost, user2@localhost
master-bin.000001	#	Query	#	#	use `test`; CREATE DEFINER=`root`@`localhost` PROCEDURE `p1`()
    SQL SECURITY INVOKER
SELECT 1
master-bin.000001	#	Query	#	#	use `test`; GRANT EXECUTE ON PROCEDURE `test`.`p1` TO 'user1'@'localhost' IDENTIFIED BY PASSWORD '*14E65567ABDB5135D0CFD9A70B3032C179A49EE7','user2'@'localhost' IDENTIFIED BY PASSWORD '*305D7BCA9D65D8D5C4677F05CD2EA2EBE350158F' WITH MAX_QUERIES_PER_HOUR 90
master-bin.000001	#	Query	#	#	use `test`; GRANT EXECUTE ON PROCEDURE `test`.`p1` TO 'user1'@'localhost' IDENTIFIED BY PASSWORD '*14E65567ABDB5135D0CFD9A70B3032C179A49EE7','user2'@'localhost' IDENTIFIED BY PASSWORD '*305D7BCA9D65D8D5C4677F05CD2EA2EBE350158F' REQUIRE SSL WITH MAX_QUERIES_PER_HOUR 90
master-bin.000001	#	Query	#	#	use `test`; GRANT EXECUTE ON PROCEDURE `test`.`p1` TO 'user1'@'localhost' IDENTIFIED BY PASSWORD '*14E65567ABDB5135D0CFD9A70B3032C179A49EE7','user2'@'localhost' IDENTIFIED BY PASSWORD '*305D7BCA9D65D8D5C4677F05CD2EA2EBE350158F'
master-bin.000001	#	Query	#	#	use `test`; REVOKE EXECUTE ON PROCEDURE p1 FROM user1@localhost, user2@localhost
master-bin.000001	#	Query	#	#	use `test`; CREATE DEFINER=`root`@`localhost` FUNCTION `f1`() RETURNS int(11)
RETURN 123
master-bin.000001	#	Query	#	#	use `test`; GRANT EXECUTE ON FUNCTION `test`.`f1` TO 'user1'@'localhost' IDENTIFIED BY PASSWORD '*14E65567ABDB5135D0CFD9A70B3032C179A49EE7','user2'@'localhost' IDENTIFIED BY PASSWORD '*305D7BCA9D65D8D5C4677F05CD2EA2EBE350158F' REQUIRE SSL WITH MAX_QUERIES_PER_HOUR 90
master-bin.000001	#	Query	#	#	use `test`; REVOKE EXECUTE ON FUNCTION f1 FROM user1@localhost, user2@localhost
master-bin.000001	#	Query	#	#	use `test`; DROP USER user1@localhost, user2@localhost
master-bin.000001	#	Query	#	#	use `test`; DROP FUNCTION f1
master-bin.000001	#	Query	#	#	use `test`; DROP PROCEDURE p1
master-bin.000001	#	Query	#	#	use `test`; GRANT ALL PRIVILEGES ON *.* TO 'test_user1'@'%' IDENTIFIED BY PASSWORD '*8D15E74BC850D11573A52BE84B504DD0BA40C1E3'
master-bin.000001	#	Query	#	#	use `test`; CREATE USER 'test_user2'@'%' IDENTIFIED BY PASSWORD '*A142844DBF024D282D88FE19CB4D3FA13B1E96E0'
master-bin.000001	#	Query	#	#	use `test`; CREATE USER 'test_user4'@'localhost'
master-bin.000001	#	Query	#	#	use `test`; SET PASSWORD FOR 'test_user4'@'localhost'='*F62B91C8AD3D5D0BBF02A761A179EA3A66B060EC'
DROP USER 'test_user4'@'localhost';
DROP USER test_user2;
DROP USER test_user1;
End of 5.6 tests!

Filemanager

Name Type Size Permission Actions
binlog_base64_flag.result File 3.81 KB 0644
binlog_bug23533.result File 486 B 0644
binlog_bug36391.result File 143 B 0644
binlog_cache_write_failure.result File 2.39 KB 0644
binlog_checksum.result File 698 B 0644
binlog_crash_safe_master_checksum.result File 1.15 KB 0644
binlog_database.result File 9.67 KB 0644
binlog_delete_and_flush_index.result File 1.73 KB 0644
binlog_dmls_on_tmp_tables_readonly.result File 1.37 KB 0644
binlog_drop_if_exists.result File 5.35 KB 0644
binlog_enforce_gtid_consistency.result File 5.09 KB 0644
binlog_error_action.result File 7.55 KB 0644
binlog_format_switch_in_tmp_table.result File 2.65 KB 0644
binlog_grant.result File 1 KB 0644
binlog_gtid_cache.result File 5 B 0644
binlog_gtid_errors.result File 8.71 KB 0644
binlog_gtid_exhausted.result File 1.1 KB 0644
binlog_gtid_implicit_commit.result File 12.4 KB 0644
binlog_gtid_innodb.result File 6.31 KB 0644
binlog_gtid_mysqlbinlog_row.result File 217.54 KB 0644
binlog_gtid_mysqlbinlog_row_innodb.result File 244.09 KB 0644
binlog_gtid_mysqlbinlog_row_myisam.result File 245.4 KB 0644
binlog_gtid_mysqlbinlog_start_stop.result File 53.15 KB 0644
binlog_gtid_row_ctype_ucs.result File 1.47 KB 0644
binlog_gtid_simple_recovery.result File 1.82 KB 0644
binlog_gtid_stm_ctype_ucs.result File 1.64 KB 0644
binlog_gtid_utils.result File 11.43 KB 0644
binlog_hexdump.result File 6.52 KB 0644
binlog_implicit_commit.result File 11.05 KB 0644
binlog_incident.result File 181 B 0644
binlog_incident_ignore.result File 181 B 0644
binlog_index.result File 11.43 KB 0644
binlog_innodb.result File 6.21 KB 0644
binlog_innodb_row.result File 3 KB 0644
binlog_killed.result File 3.74 KB 0644
binlog_killed_simulate.result File 1.19 KB 0644
binlog_max_extension.result File 378 B 0644
binlog_mixed_cache_stat.result File 3.2 KB 0644
binlog_mixed_load_data.result File 420 B 0644
binlog_multi_engine.result File 5.16 KB 0644
binlog_mysqlbinlog-cp932.result File 358 B 0644
binlog_mysqlbinlog_base64.result File 1.71 KB 0644
binlog_mysqlbinlog_concat.result File 488 B 0644
binlog_mysqlbinlog_filter.result File 1.48 KB 0644
binlog_mysqlbinlog_raw.result File 832 B 0644
binlog_mysqlbinlog_row.result File 178.43 KB 0644
binlog_mysqlbinlog_row_innodb.result File 240.22 KB 0644
binlog_mysqlbinlog_row_myisam.result File 241.53 KB 0644
binlog_mysqlbinlog_row_trans.result File 15.47 KB 0644
binlog_mysqlbinlog_start_stop.result File 45.55 KB 0644
binlog_mysqlbinlog_start_stop_slave_server_id.result File 3.94 KB 0644
binlog_old_versions.result File 1.59 KB 0644
binlog_query_filter_rules.result File 187 B 0644
binlog_reset_master.result File 14 B 0644
binlog_rewrite.result File 6.65 KB 0644
binlog_rotate_bgc_sync.result File 1.82 KB 0644
binlog_row_binlog.result File 42.98 KB 0644
binlog_row_cache_stat.result File 3.2 KB 0644
binlog_row_ctype_cp932.result File 87.42 KB 0644
binlog_row_ctype_ucs.result File 1.36 KB 0644
binlog_row_drop_tbl.result File 567 B 0644
binlog_row_drop_tmp_tbl.result File 3.44 KB 0644
binlog_row_insert_select.result File 758 B 0644
binlog_row_mix_innodb_myisam.result File 30.4 KB 0644
binlog_row_mysqlbinlog_db_filter.result File 1.5 KB 0644
binlog_row_mysqlbinlog_verbose.result File 2.84 KB 0644
binlog_row_query_log_events.result File 442 B 0644
binlog_server_id.result File 459 B 0644
binlog_server_start_options.result File 52 B 0644
binlog_sf.result File 1.67 KB 0644
binlog_spurious_ddl_errors.result File 2.97 KB 0644
binlog_sql_mode.result File 3.46 KB 0644
binlog_start_comment.result File 371 B 0644
binlog_statement_insert_delayed.result File 2.78 KB 0644
binlog_stm_binlog.result File 41.24 KB 0644
binlog_stm_blackhole.result File 7.89 KB 0644
binlog_stm_cache_stat.result File 3.2 KB 0644
binlog_stm_ctype_cp932.result File 87.42 KB 0644
binlog_stm_ctype_ucs.result File 1.53 KB 0644
binlog_stm_do_db.result File 2.41 KB 0644
binlog_stm_drop_tbl.result File 513 B 0644
binlog_stm_drop_tmp_tbl.result File 4.16 KB 0644
binlog_stm_insert_select.result File 711 B 0644
binlog_stm_mix_innodb_myisam.result File 35.93 KB 0644
binlog_stm_ps.result File 1.16 KB 0644
binlog_stm_row.result File 3.07 KB 0644
binlog_stm_unsafe_warning.result File 4.76 KB 0644
binlog_stm_user_variables.result File 5.31 KB 0644
binlog_switch_inside_trans.result File 7.97 KB 0644
binlog_tmp_table.result File 905 B 0644
binlog_truncate_kill.result File 1.23 KB 0644
binlog_truncate_myisam.result File 2.97 KB 0644
binlog_trx_empty_assertions.result File 884 B 0644
binlog_unsafe.result File 194.55 KB 0644
binlog_unsafe_stmt_capable_engine.result File 186.33 KB 0644
binlog_use_gtid_skip.result File 311 B 0644
binlog_variables_log_bin.result File 319 B 0644
binlog_variables_log_bin_index.result File 313 B 0644
binlog_variables_relay_log.result File 475 B 0644
binlog_variables_relay_log_index.result File 469 B 0644
binlog_write_error.result File 2.47 KB 0644
binlog_xa_handling.result File 280 B 0644
show_binlog_events_no_lock.result File 324 B 0644