流浪汉机器 - 如何找出mysql用户名/密码

Mil*_*anG 6 mysql credentials vagrant

因此,在atlas.hashicorp.com上有许多预安装的机器,包括PHP和MySql.但问题是,我无法找到任何地方的MySql凭据.即:

https://atlas.hashicorp.com/webinfopro/boxes/ubuntu-xenial-lamp

我可以访问PhpMyAdmin,但我无法登录.尝试了用户名/密码(root,vagrant,12345678)的所有"通常"组合.但它们都不起作用.当你不提供root用户凭据时,安装MySql的重点是什么?!?

我还按照一些说明重置root用户密码:

https://help.ubuntu.com/community/MysqlPasswordReset

但是我收到了很多错误,最终失败了.我对调试和解决许多问题不感兴趣 - 只是想快速拥有可用的PHP 7 LAMP环境.

Fré*_*nri 12

tldr;

密码是123

到那里怎么走 :

我从这个盒子中旋转了一个VM后,我登录并检查了mysql conf中的几个文件,特别是文件 /etc/mysql/debian.cnf

[12:41 ]-[vagrant@symfony]-[/etc/mysql]
$ sudo more debian.cnf
# Automatically generated for Debian scripts. DO NOT TOUCH!
[client]
host     = localhost
user     = debian-sys-maint
password = 7WpHbEJmn1MxcfD9
socket   = /var/run/mysqld/mysqld.sock
[mysql_upgrade]
host     = localhost
user     = debian-sys-maint
password = 7WpHbEJmn1MxcfD9
socket   = /var/run/mysqld/mysqld.sock
basedir  = /usr
Run Code Online (Sandbox Code Playgroud)

所以我可以使用此文件中的用户进行连接

[12:41 ]-[vagrant@symfony]-[/etc/mysql]
$ mysql -u debian-sys-maint -p
Enter password:
Welcome to the MySQL monitor.  Commands end with ; or \g.
Your MySQL connection id is 17
....
Run Code Online (Sandbox Code Playgroud)

我检查了已经创建的表中的用户

mysql> SELECT User, Host, Password FROM mysql.user;
+------------------+-------------+-------------------------------------------+
| User             | Host        | Password                                  |
+------------------+-------------+-------------------------------------------+
| root             | localhost   | *23AE809DDACAF96AF0FD78ED04B6A265E05AA257 |
| root             | symfony.dev | *23AE809DDACAF96AF0FD78ED04B6A265E05AA257 |
| root             | 127.0.0.1   | *23AE809DDACAF96AF0FD78ED04B6A265E05AA257 |
| root             | ::1         | *23AE809DDACAF96AF0FD78ED04B6A265E05AA257 |
| debian-sys-maint | localhost   | *8275381EF253977AC1CD84B53CAFE742E4288272 |
| phpmyadmin       | localhost   | *23AE809DDACAF96AF0FD78ED04B6A265E05AA257 |
+------------------+-------------+-------------------------------------------+
6 rows in set (0,00 sec)
Run Code Online (Sandbox Code Playgroud)

所以他们都包含相同的密码..响铃,检查

mysql> select password ('123');
+-------------------------------------------+
| password ('123')                          |
+-------------------------------------------+
| *23AE809DDACAF96AF0FD78ED04B6A265E05AA257 |
+-------------------------------------------+
1 row in set (0,00 sec)
Run Code Online (Sandbox Code Playgroud)


小智 7

只需尝试上述所有密码(root,空字符串,123等),都无济于事。我正在使用此框https://app.vagrantup.com/brownell/boxes/xenial64lemp

经过半个小时的暴力破解,发现该root用户的密码为secret