LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘Command Line Password’

Command Line Password

0 votedvote

Detected 1 occurrence(s) of ‘\-\-[pP]assword\=[^%^\$]’:

 - name: IPA, unenroll, enroll
   command: chdir=/usr/sbin/ {{ item }}
   with_items:
        - ./ipa-client-install --uninstall --unattended
        - ./ipa-client-install --unattended --principal="{{ ipauser }}" --password="{{ ipapassword }}" --mkhomedir

Source: http://pastebin.com/raw.php?i=yCnfmKhh

Command Line Password

0 votedvote

Detected 2 occurrence(s) of ‘\-\-[pP]assword\=[^%^\$]’:

TRACK\et2dbackup\easyauditbackup2.sql

copy c:\EASYTRACK\et2dbackup\easyauditbackup1.sql c:\et2dbackup\easyauditbackup2.sql

del c:\EASYTRACK\et2dbackup\easyauditbackup1.sql

 

cd\Programmi\MySQL\MySQL Server 5.5\bin\

mysqldump.exe --user=root --password=E4syTrack! easyaudit40 --quick --result-file c:\EASYTRACK\et2dbackup\easyauditbackup1.sql

cd\

Source: http://pastebin.com/raw.php?i=4qreTVMG

Command Line Password

0 votedvote

Detected 1 occurrence(s) of ‘\-\-[pP]assword\=[^%^\$]’:

       if (split.contains(".")){ //Kiểm tra xem chuỗi nhập vào có dấu '.' hay không
            filename = part1;
        }
        //
        String[] restoreCmd = new String[]{"C:\\Program Files\\MySQL\\MySQL Server 5.7\\bin\\mysql", "--user=root", "--password=root", "-e", "source " + "E:\\sql_backup\\" + filename +".sql"};
        Process runtimeProcess;
        try {
            PrintWriter writer = response.getWriter();
            runtimeProcess = Runtime.getRuntime().exec(restoreCmd);
            int pr

Source: http://pastebin.com/raw.php?i=BjKtvkSn

Command Line Password

0 votedvote

Detected 1 occurrence(s) of ‘\-\-[pP]assword\=[^%^\$]’:

# remove password from a pdf file (if password is already known):
qpdf --decrypt --password=<password> infile outfile.pdf

# extract pages from a pdf file:
pdftk infile cat 3-6 output outfile.pdf

# merge pdfs:
pdftk *.pdf cat output outfile.pdf

# convert jpg to pdf:
convert -compress jpeg *.jpg outfile.pdf

Source: http://pastebin.com/raw.php?i=nDBMWSUW

Simple Password

0 votedvote

Detected 6 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]’:

' IDENTIFIED BY 'secret' WITH GRANT OPTION;"
mysql --user="root" --password="secret" -e "GRANT ALL ON *.* TO 'homestead'@'%' IDENTIFIED BY 'secret' WITH GRANT OPTION;"
mysql --user="root" --password="secret" -e "FLUSH PRIVILEGES;"
mysql --user="root" --password="secret" -e "CREATE DATABASE homestead;"
service mysql restart

Detected 1 occurrence(s) of ‘create user .* identified by’:

/bind-address = 0.0.0.0/' /etc/mysql/mysql.conf.d/mysqld.cnf

mysql --user="root" --password="secret" -e "GRANT ALL ON *.* TO root@'0.0.0.0' IDENTIFIED BY 'secret' WITH GRANT OPTION;"
service mysql restart

mysql --user="root" --password="secret" -e "CREATE USER 'homestead'@'0.0.0.0' IDENTIFIED BY 'secret';"
mysql --user="root" --password="secret" -e "GRANT ALL ON *.* TO 'homestead'@'0.0.0.0' IDENTIFIED BY 'secret' WITH GRANT OPTION;"
mysql --user="root" --password="secret" -e "GRANT ALL ON *.* TO 'homestead'@'%' IDENTIFIED BY 'secret' WITH GRANT

Detected 6 occurrence(s) of ‘\-\-[pP]assword\=[^%^\$]’:

.0' IDENTIFIED BY 'secret' WITH GRANT OPTION;"
mysql --user="root" --password="secret" -e "GRANT ALL ON *.* TO 'homestead'@'%' IDENTIFIED BY 'secret' WITH GRANT OPTION;"
mysql --user="root" --password="secret" -e "FLUSH PRIVILEGES;"
mysql --user="root" --password="secret" -e "CREATE DATABASE homestead;"
service mysql restart

Detected 3 occurrence(s) of ‘grant .* to .* identified by’:

password="secret" -e "CREATE USER 'homestead'@'0.0.0.0' IDENTIFIED BY 'secret';"
mysql --user="root" --password="secret" -e "GRANT ALL ON *.* TO 'homestead'@'0.0.0.0' IDENTIFIED BY 'secret' WITH GRANT OPTION;"
mysql --user="root" --password="secret" -e "GRANT ALL ON *.* TO 'homestead'@'%' IDENTIFIED BY 'secret' WITH GRANT OPTION;"
mysql --user="root" --password="secret" -e "FLUSH PRIVILEGES;"
mysql --user="root" --password="secret" -e "CREATE DATABASE homestead;"
service mysql restart

Source: http://pastebin.com/raw.php?i=QAKgveaf