Mil*_*anG 6 mysql credentials vagrant
因此,在atlas.hashicorp.com上有许多预安装的机器,包括PHP和MySql.但问题是,我无法找到任何地方的MySql凭据.即:
https://atlas.hashicorp.com/webinfopro/boxes/ubuntu-xenial-lamp
我可以访问PhpMyAdmin,但我无法登录.尝试了用户名/密码(root,vagrant,12345678)的所有"通常"组合.但它们都不起作用.当你不提供root用户凭据时,安装MySql的重点是什么?!?
我还按照一些说明重置root用户密码:
https://help.ubuntu.com/community/MysqlPasswordReset
但是我收到了很多错误,最终失败了.我对调试和解决许多问题不感兴趣 - 只是想快速拥有可用的PHP 7 LAMP环境.
Fré*_*nri 12
tldr;
密码是123
到那里怎么走 :
我从这个盒子中旋转了一个VM后,我登录并检查了mysql conf中的几个文件,特别是文件 /etc/mysql/debian.cnf
[12:41 ]-[vagrant@symfony]-[/etc/mysql]
$ sudo more debian.cnf
# Automatically generated for Debian scripts. DO NOT TOUCH!
[client]
host = localhost
user = debian-sys-maint
password = 7WpHbEJmn1MxcfD9
socket = /var/run/mysqld/mysqld.sock
[mysql_upgrade]
host = localhost
user = debian-sys-maint
password = 7WpHbEJmn1MxcfD9
socket = /var/run/mysqld/mysqld.sock
basedir = /usr
Run Code Online (Sandbox Code Playgroud)
所以我可以使用此文件中的用户进行连接
[12:41 ]-[vagrant@symfony]-[/etc/mysql]
$ mysql -u debian-sys-maint -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 17
....
Run Code Online (Sandbox Code Playgroud)
我检查了已经创建的表中的用户
mysql> SELECT User, Host, Password FROM mysql.user;
+------------------+-------------+-------------------------------------------+
| User | Host | Password |
+------------------+-------------+-------------------------------------------+
| root | localhost | *23AE809DDACAF96AF0FD78ED04B6A265E05AA257 |
| root | symfony.dev | *23AE809DDACAF96AF0FD78ED04B6A265E05AA257 |
| root | 127.0.0.1 | *23AE809DDACAF96AF0FD78ED04B6A265E05AA257 |
| root | ::1 | *23AE809DDACAF96AF0FD78ED04B6A265E05AA257 |
| debian-sys-maint | localhost | *8275381EF253977AC1CD84B53CAFE742E4288272 |
| phpmyadmin | localhost | *23AE809DDACAF96AF0FD78ED04B6A265E05AA257 |
+------------------+-------------+-------------------------------------------+
6 rows in set (0,00 sec)
Run Code Online (Sandbox Code Playgroud)
所以他们都包含相同的密码..响铃,检查
mysql> select password ('123');
+-------------------------------------------+
| password ('123') |
+-------------------------------------------+
| *23AE809DDACAF96AF0FD78ED04B6A265E05AA257 |
+-------------------------------------------+
1 row in set (0,00 sec)
Run Code Online (Sandbox Code Playgroud)
小智 7
只需尝试上述所有密码(root,空字符串,123等),都无济于事。我正在使用此框https://app.vagrantup.com/brownell/boxes/xenial64lemp。
经过半个小时的暴力破解,发现该root用户的密码为secret
| 归档时间: |
|
| 查看次数: |
10356 次 |
| 最近记录: |