Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
504 SELLING [FOR SALE] High-Privilege MySQL Access (ROOT + App User) – French OPCOEP JSON FORMAT
STAFF TEAM
#1
DATA TYPE: Privileged MySQL User Dump  
FORMAT: .json (structured export from mysql.user table)  
SOURCE: Internal access to French OPCO/OPCAEP-related infrastructure  
STATUS: Freshly exploited – credentials confirmed valid (Q2 2025)  
LEAK STATUS: PRIVATE – NOT PUBLICLY LEAKED

SYSTEM: MariaDB / MySQL – Localhost Access – Full privilege scope

USER ACCOUNTS INCLUDED
- root@localhost – full administrative access (WITH GRANT OPTION)
- opcaappli@localhost – privileged application account
- mysql@localhost – system-level MySQL internal user
- mariadb.sys@localhost – locked system user

HASH TYPE: SHA1 (MySQL's mysql_native_password format)

FORMAT SAMPLE (JSON SNIPPET)
{
  "user": "opcaappli",
  "host": "localhost",
  "plugin": "mysql_native_password",
  "authentication_string": "*C814DB13F1D6AB4B76690....",
  "access": 549755812863,
  "password_last_changed": 1638368951
}

HASH PREVIEW (Partial)
root        → *40E2E24C5606A6B3F7D0B99E...
opcaappli   → *C814DB13F1D6AB4B766906FB...

Authentication plugin: mysql_native_password  
Secondary method: unix_socket (enabled on some accounts)

TIMESTAMP DETAILS
- Dump created: November 2021  
- Last password change: Nov 26, 2021  
- Credentials confirmed active as of May 2025

NOTES
- Host set to localhost: indicates internal access
- opcaappli likely tied to ERP or HR systems (production use)
- Structured JSON format: easy integration for tooling and testing

PRICING
- Starting bid: $1,200  
- Buy It Now (BIN): $3,500  
- Escrow available | Trusted middlemen accepted

RULES
- Private Sale – NO LEAK  
- Proof available for serious buyers (metadata, redacted screenshots, hash validation)
- No resell, no mirror, no leak

CONTACT
- DM Telegram: @Jeremydurvier
- English/French OK  
- Listing Ref: OPCOEP-MYSQL-112021-JSON-PRIV8

Reply to this thread