There are many security questions about mysql database Elevation of Privilege, such as remote Elevation of Privilege, root user Elevation of Privilege, and usage of UDF security issues. Let's take a look at these questions.
I. Usage of UDF security
I. UDF Privilege Escalation
I think everyone knows about this type of elevation of permission. I will roughly write the following statements:
Create function example shell returns string soname 'udf. dll'Select external shell ('net user iis_user 123!
1 Login With the previous MySQL login mode
[mysql@eanintmydbc002db1 mysqllog]$ mysql Enter password:Welcome to the MySQL Monitor. Commands End With; or \g.Your MySQL Connection ID is 3157186Server version:5.5.25a-log MySQL EA Release Copyright (c),
MySQL permission bitsCN.com
I. permission table
Three permission tables in the mysql database: user, db, host
The access process of the permission table is:
1) Check whether the connected IP address, user name, and password exist in the table from
For content-driven Web sites, the key to the quality of the design is the relational database. In this tutorial, we have built our database using the MySQL relational database management system (RDBMS). MySQL is a popular choice for Web site
MySQL for security, by default users are allowed to log on locally only, but in this case, you still need to use the user for remote connection, so that they can be remotely required to do the following:Allow the root user to remotely log in
User Rights Management mainly has the following functions:1. You can restrict which libraries a user accesses, which tables2. You can restrict which tables the user performs for select, CREATE, delete, delete, alter, etc.3. The IP or domain name
Original address: http://www.biaodianfu.com/mysql-best-practices.htmlRecently looking at MySQL related content, collation of the following specifications, as a just learn MySQL rookie, finishing the content is very basic, the middle may involve the
From: 90 sacret Team Information Security Team The method I provided is relatively harsh, but it is a way of thinking that may help you when your intrusion is blocked. Let's take a look at the requirements of this injection point: 1. magic_quote
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.