好得很程序员自学网

<tfoot draggable='sEl'></tfoot>

破解sqlserver存储过程

这个版本已经在sqlserver20008中破解成功 操作方法: 1.先copy下面这段sql在查询分析器里执行一下,此即为解密存储过程 create PROCEDURE [ dbo ] . [ sp_decrypt ] ( @procedure sysname = NULL ) AS SET NOCOUNT ON BEGIN DECLARE @intProcSpace bigint ,

这个版本已经在sqlserver20008中破解成功

操作方法:

1.先copy下面这段sql在查询分析器里执行一下,此即为解密存储过程

 create   PROCEDURE   [  dbo  ] . [  sp_decrypt  ]  

( @procedure sysname = NULL )

AS

SET NOCOUNT ON

BEGIN

DECLARE @intProcSpace bigint , @t bigint , @maxColID smallint , @intEncrypted

tinyint , @procNameLength int

select @maxColID = max (subobjid), @intEncrypted = imageval FROM

sys.sysobjvalues WHERE objid = object_id ( @procedure )

GROUP BY imageval



select @procNameLength = datalength ( @procedure ) + 29

DECLARE @real_01 nvarchar ( max )

DECLARE @fake_01 nvarchar ( max )

DECLARE @fake_encrypt_01 nvarchar ( max )

DECLARE @real_decrypt_01 nvarchar ( max ), @real_decrypt_01a nvarchar ( max )

declare @objtype varchar ( 2 ), @ParentName nvarchar ( max )

select @real_decrypt_01a = ''

-- 提取对象的类型如是存储过程还是函数,如果是触发器,还要得到其父对象的名称

select @objtype = type, @parentname = object_name (parent_object_id)

from sys.objects where [ object_id ] = object_id ( @procedure )

-- 从sys.sysobjvalues里提出加密的imageval记录

SET @real_01 = ( SELECT top 1 imageval FROM sys.sysobjvalues WHERE objid =

object_id ( @procedure ) and valclass = 1 order by subobjid)

-- 创建一个临时表

create table #output ( [ ident ] [ int ] IDENTITY ( 1 , 1 ) NOT NULL ,

[ real_decrypt ] NVARCHAR ( MAX ) )

-- 开始一个事务,稍后回滚

BEGIN TRAN

-- 更改原始的存储过程,用短横线替换

if @objtype = ' P '

SET @fake_01 = ' ALTER PROCEDURE ' + @procedure + ' WITH ENCRYPTION AS

' + REPLICATE ( ' - ' , 40003 - @procNameLength )

else if @objtype = ' FN '

SET @fake_01 = ' ALTER FUNCTION ' + @procedure + ' () RETURNS INT WITH ENCRYPTION AS BEGIN RETURN 1

/* ' + REPLICATE ( ' * ' , datalength ( @real_01 ) / 2 - @procNameLength ) + ' */ END '

else if @objtype = ' V '

SET @fake_01 = ' ALTER view ' + @procedure + ' WITH ENCRYPTION AS select 1 as col

/* ' + REPLICATE ( ' * ' , datalength ( @real_01 ) / 2 - @procNameLength ) + ' */ '

else if @objtype = ' TR '

SET @fake_01 = ' ALTER trigger ' + @procedure + ' ON ' + @parentname + ' WITH ENCRYPTION AFTER INSERT AS RAISERROR ( '' N '' ,16,10)

/* ' + REPLICATE ( ' * ' , datalength ( @real_01 ) / 2 - @procNameLength ) + ' */ '

EXECUTE ( @fake_01 )

-- 从sys.sysobjvalues里提出加密的假的

SET @fake_encrypt_01 = ( SELECT top 1 imageval FROM sys.sysobjvalues WHERE objid =

object_id ( @procedure ) and valclass = 1 order by subobjid )

if @objtype = ' P '

SET @fake_01 = ' Create PROCEDURE ' + @procedure + ' WITH ENCRYPTION AS

' + REPLICATE ( ' - ' , 40003 - @procNameLength )

else if @objtype = ' FN '

SET @fake_01 = ' CREATE FUNCTION ' + @procedure + ' () RETURNS INT WITH ENCRYPTION AS BEGIN RETURN 1

/* ' + REPLICATE ( ' * ' , datalength ( @real_01 ) / 2 - @procNameLength ) + ' */ END '

else if @objtype = ' V '

SET @fake_01 = ' Create view ' + @procedure + ' WITH ENCRYPTION AS select 1 as col

/* ' + REPLICATE ( ' * ' , datalength ( @real_01 ) / 2 - @procNameLength ) + ' */ '

else if @objtype = ' TR '

SET @fake_01 = ' Create trigger ' + @procedure + ' ON ' + @parentname + ' WITH ENCRYPTION AFTER INSERT AS RAISERROR ( '' N '' ,16,10)

/* ' + REPLICATE ( ' * ' , datalength ( @real_01 ) / 2 - @procNameLength ) + ' */ '

-- 开始计数

SET @intProcSpace = 1

-- 使用字符填充临时变量

SET @real_decrypt_01 = replicate (N ' A ' , ( datalength ( @real_01 ) / 2 ))

-- 循环设置每一个变量,创建真正的变量

-- 每次一个字节

SET @intProcSpace = 1

-- 如有必要,遍历每个@real_xx变量并解密

WHILE @intProcSpace ( datalength ( @real_01 ) / 2 )

BEGIN

-- 真的和假的和加密的假的进行异或处理

SET @real_decrypt_01 = stuff ( @real_decrypt_01 , @intProcSpace , 1 ,

NCHAR ( UNICODE ( substring ( @real_01 , @intProcSpace , 1 )) ^

( UNICODE ( substring ( @fake_01 , @intProcSpace , 1 )) ^

UNICODE ( substring ( @fake_encrypt_01 , @intProcSpace , 1 )))))

SET @intProcSpace = @intProcSpace + 1

END

-- 通过sp_helptext逻辑向表#output里插入变量

insert #output (real_decrypt) select @real_decrypt_01

-- select real_decrypt AS '#output chek' from #output --测试

-- -------------------------------------

-- 开始从sp_helptext提取

-- -------------------------------------

declare @dbname sysname

, @BlankSpaceAdded int

, @BasePos int

, @CurrentPos int

, @TextLength int

, @LineId int

, @AddOnLen int

, @LFCR int -- 回车换行的长度

, @DefinedLength int

, @SyscomText nvarchar ( 4000 )

, @Line nvarchar ( 255 )

Select @DefinedLength = 255

SELECT @BlankSpaceAdded = 0 -- 跟踪行结束的空格。注意Len函数忽略了多余的空格

CREATE TABLE #CommentText

(LineId int

, Text nvarchar ( 255 ) collate database_default)

-- 使用#output代替sys.sysobjvalues

DECLARE ms_crs_syscom CURSOR LOCAL

FOR SELECT real_decrypt from #output

ORDER BY ident

FOR READ ONLY

-- 获取文本

SELECT @LFCR = 2

SELECT @LineId = 1

OPEN ms_crs_syscom

FETCH NEXT FROM ms_crs_syscom into @SyscomText

WHILE @@fetch_status >= 0

BEGIN

SELECT @BasePos = 1

SELECT @CurrentPos = 1

SELECT @TextLength = LEN ( @SyscomText )

WHILE @CurrentPos != 0

BEGIN

-- 通过回车查找行的结束

SELECT @CurrentPos = CHARINDEX ( char ( 13 ) + char ( 10 ), @SyscomText ,

@BasePos )

-- 如果找到回车

IF @CurrentPos != 0

BEGIN

-- 如果@Lines的长度的新值比设置的大就插入@Lines目前的内容并继续

While ( isnull ( LEN ( @Line ), 0 ) + @BlankSpaceAdded +

@CurrentPos - @BasePos + @LFCR ) > @DefinedLength

BEGIN

SELECT @AddOnLen = @DefinedLength - ( isnull ( LEN ( @Line ), 0 ) +

@BlankSpaceAdded )

INSERT #CommentText VALUES

( @LineId ,

isnull ( @Line , N '' ) + isnull ( SUBSTRING ( @SyscomText ,

@BasePos , @AddOnLen ), N '' ))

SELECT @Line = NULL , @LineId = @LineId + 1 ,

@BasePos = @BasePos + @AddOnLen , @BlankSpaceAdded = 0

END

SELECT @Line = isnull ( @Line , N '' ) +

isnull ( SUBSTRING ( @SyscomText , @BasePos , @CurrentPos - @BasePos + @LFCR ), N '' )

SELECT @BasePos = @CurrentPos + 2

INSERT #CommentText VALUES ( @LineId , @Line )

SELECT @LineId = @LineId + 1

SELECT @Line = NULL

END

ELSE

-- 如果回车没找到

BEGIN

IF @BasePos @TextLength

BEGIN

-- 如果@Lines长度的新值大于定义的长度

While ( isnull ( LEN ( @Line ), 0 ) + @BlankSpaceAdded +

@TextLength - @BasePos + 1 ) > @DefinedLength

BEGIN

SELECT @AddOnLen = @DefinedLength -

( isnull ( LEN ( @Line ), 0 ) + @BlankSpaceAdded )

INSERT #CommentText VALUES

( @LineId ,

isnull ( @Line , N '' ) + isnull ( SUBSTRING ( @SyscomText ,

@BasePos , @AddOnLen ), N '' ))

SELECT @Line = NULL , @LineId = @LineId + 1 ,

@BasePos = @BasePos + @AddOnLen , @BlankSpaceAdded =

0

END

SELECT @Line = isnull ( @Line , N '' ) +

isnull ( SUBSTRING ( @SyscomText , @BasePos , @TextLength - @BasePos + 1 ), N '' )

if LEN ( @Line ) @DefinedLength and charindex ( ' ' ,

@SyscomText , @TextLength + 1 ) > 0

BEGIN

SELECT @Line = @Line + ' ' , @BlankSpaceAdded = 1

END

END

END

END

FETCH NEXT FROM ms_crs_syscom into @SyscomText

END

IF @Line is NOT NULL

INSERT #CommentText VALUES ( @LineId , @Line )

select Text from #CommentText order by LineId

CLOSE ms_crs_syscom

DEALLOCATE ms_crs_syscom

DROP TABLE #CommentText

-- -------------------------------------

-- 结束从sp_helptext提取

-- -------------------------------------

-- 删除用短横线创建的存储过程并重建原始的存储过程

ROLLBACK TRAN

DROP TABLE #output

END



2.启用sqlserver的dac,远程dac启用方法

在查询分析器里运行

EXEC sp_configure 'remote admin connections', 1;
RECONFIGURE;

3.然后开一个 数据库引擎查询(database engine query), 切记这个查询和一般的查询不一样

接下来在弹开的数据库连接对话框里

[服务器名称 ]这一栏里面输入[admin:数据库ip地址或别名],其他和平时连接一样

4. 这步你懂的 exec sp_decrypt '要破解的存储过程名字'

查看更多关于破解sqlserver存储过程的详细内容...

  阅读:47次