[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4DDCA897.1040807@gmail.com>
Date: Wed, 25 May 2011 02:58:31 -0400
From: Brandon McGinty <brandon.mcginty@...il.com>
To: Tracy Reed <treed@...raviolet.org>
Cc: Full Disclosure <full-disclosure@...ts.grok.org.uk>
Subject: Re: MySql Password Auditor v1.0 Released
If noone finds a tool to do this, I'd have no problem developing one.
MySQL has to be run with the --log[=filename] option to capture querys,
but the format appears to be quite usable.
I'd appreciate feedback as to whether or not this would be useful.
Have a good one.
Brandon McGinty
On 5/24/2011 6:57 PM, Tracy Reed wrote:
> On Wed, May 25, 2011 at 03:30:18AM +0530, Nagareshwar Talekar spake thusly:
>> In addition to recovering your lost/forgotten passwords, it can also
>> help you to audit Mysql database server setup in an corporate
>> environment by discovering the weak password configurations.
>
> What a nice euphemism. :)
>
> The only thing legitimate database administrators really need to know is:
>
> http://dev.mysql.com/doc/refman/5.0/en/resetting-permissions.html#resetting-permissions-unix
>
> If anyone wanted to write a real tool for auditing mysql they would look at
> query logs and generate a list of least-privilege permissions each user needs
> and identify database users with overly broad permissions based on past usage.
> Anyone know if such a tool exists? I keep hoping the ingenious maatkit folks
> will come up with something along these lines.
>
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists