当前位置:Gxlcms > mysql > 破解sqlserver存储过程

破解sqlserver存储过程

时间:2021-07-01 10:21:17 帮助过:32人阅读

这个版本已经在sqlserver20008中破解成功 操作方法: 1.先copy下面这段sql在查询分析器里执行一下,此即为解密存储过程 create PROCEDURE [ dbo ] . [ sp_decrypt ] ( @procedure sysname = NULL ) AS SET NOCOUNT ON BEGIN DECLARE @intProcSpace bigint ,

这个版本已经在sqlserver20008中破解成功

操作方法:

1.先copy下面这段sql在查询分析器里执行一下,此即为解密存储过程

create PROCEDURE [dbo].[sp_decrypt] 

(@procedure sysname = NULL)

AS

SET NOCOUNT ON

BEGIN

DECLARE @intProcSpace bigint, @t bigint, @maxColID smallint,@intEncrypted

tinyint,@procNameLength int

select @maxColID = max(subobjid),@intEncrypted = imageval FROM

sys.sysobjvalues WHERE objid = object_id(@procedure)

GROUP BY imageval



select @procNameLength = datalength(@procedure) + 29

DECLARE @real_01 nvarchar(max)

DECLARE @fake_01 nvarchar(max)

DECLARE @fake_encrypt_01 nvarchar(max)

DECLARE @real_decrypt_01 nvarchar(max),@real_decrypt_01a nvarchar(max)

declare @objtype varchar(2),@ParentName nvarchar(max)

select @real_decrypt_01a = ''

--提取对象的类型如是存储过程还是函数,如果是触发器,还要得到其父对象的名称

select @objtype=type,@parentname=object_name(parent_object_id)

from sys.objects where [object_id]=object_id(@procedure)

-- 从sys.sysobjvalues里提出加密的imageval记录

SET @real_01=(SELECT top 1 imageval FROM sys.sysobjvalues WHERE objid =

object_id(@procedure) and valclass = 1 order by subobjid)

--创建一个临时表

create table #output ( [ident] [int] IDENTITY (1, 1) NOT NULL ,

[real_decrypt] NVARCHAR(MAX) )

--开始一个事务,稍后回滚

BEGIN TRAN

--更改原始的存储过程,用短横线替换

if @objtype='P'

SET @fake_01='ALTER PROCEDURE '+ @procedure +' WITH ENCRYPTION AS

'+REPLICATE('-', 40003 - @procNameLength)

else if @objtype='FN'

SET @fake_01='ALTER FUNCTION '+ @procedure +'() RETURNS INT WITH ENCRYPTION AS BEGIN RETURN 1

/*
'+REPLICATE('*', datalength(@real_01) /2 - @procNameLength)+'*/ END'

else if @objtype='V'

SET @fake_01='ALTER view '+ @procedure +' WITH ENCRYPTION AS select 1 as col

/*
'+REPLICATE('*', datalength(@real_01) /2 - @procNameLength)+'*/'

else if @objtype='TR'

SET @fake_01='ALTER trigger '+ @procedure +' ON '+@parentname+'WITH ENCRYPTION AFTER INSERT AS RAISERROR (''N'',16,10)

/*
'+REPLICATE('*', datalength(@real_01) /2 - @procNameLength)+'*/'

EXECUTE (@fake_01)

--从sys.sysobjvalues里提出加密的假的

SET @fake_encrypt_01=(SELECT top 1 imageval FROM sys.sysobjvalues WHERE objid =

object_id(@procedure) and valclass = 1 order by subobjid )

if @objtype='P'

SET @fake_01='Create PROCEDURE '+ @procedure +' WITH ENCRYPTION AS

'+REPLICATE('-', 40003 - @procNameLength)

else if @objtype='FN'

SET @fake_01='CREATE FUNCTION '+ @procedure +'() RETURNS INT WITH ENCRYPTION AS BEGIN RETURN 1

/*
'+REPLICATE('*', datalength(@real_01) /2 - @procNameLength)+'*/ END'

else if @objtype='V'

SET @fake_01='Create view '+ @procedure +' WITH ENCRYPTION AS select 1 as col

/*
'+REPLICATE('*', datalength(@real_01) /2 - @procNameLength)+'*/'

else if @objtype='TR'

SET @fake_01='Create trigger '+ @procedure +' ON '+@parentname+'WITH ENCRYPTION AFTER INSERT AS RAISERROR (''N'',16,10)

/*
'+REPLICATE('*', datalength(@real_01) /2 - @procNameLength)+'*/'

--开始计数

SET @intProcSpace=1

--使用字符填充临时变量

SET @real_decrypt_01 = replicate(N'A', (datalength(@real_01) /2 ))

--循环设置每一个变量,创建真正的变量

--每次一个字节

SET @intProcSpace=1

--如有必要,遍历每个@real_xx变量并解密

WHILE @intProcSpace<=(datalength(@real_01)/2)

BEGIN

--真的和假的和加密的假的进行异或处理

SET @real_decrypt_01 = stuff(@real_decrypt_01, @intProcSpace, 1,

NCHAR(UNICODE(substring(@real_01, @intProcSpace, 1)) ^

(UNICODE(substring(@fake_01, @intProcSpace, 1)) ^

UNICODE(substring(@fake_encrypt_01, @intProcSpace, 1)))))

SET @intProcSpace=@intProcSpace+1

END

--通过sp_helptext逻辑向表#output里插入变量

insert #output (real_decrypt) select @real_decrypt_01

-- select real_decrypt AS '#output chek' from #output --测试

-- -------------------------------------

--开始从sp_helptext提取

-- -------------------------------------

declare @dbname sysname

,@BlankSpaceAdded int

,@BasePos int

,@CurrentPos int

,@TextLength int

,@LineId int

,@AddOnLen int

,@LFCR int --回车换行的长度

,@DefinedLength int

,@SyscomText nvarchar(4000)

,@Line nvarchar(255)

Select @DefinedLength = 255

SELECT @BlankSpaceAdded = 0 --跟踪行结束的空格。注意Len函数忽略了多余的空格

CREATE TABLE #CommentText

(LineId int

,Text nvarchar(255) collate database_default)

--使用#output代替sys.sysobjvalues

DECLARE ms_crs_syscom CURSOR LOCAL

FOR SELECT real_decrypt from #output

ORDER BY ident

FOR READ ONLY

--获取文本

SELECT @LFCR = 2

SELECT @LineId = 1

OPEN ms_crs_syscom

FETCH NEXT FROM ms_crs_syscom into @SyscomText

WHILE @@fetch_status >= 0

BEGIN

SELECT @BasePos = 1

SELECT @CurrentPos = 1

SELECT @TextLength = LEN(@SyscomText)

WHILE @CurrentPos != 0

BEGIN

--通过回车查找行的结束

SELECT @CurrentPos = CHARINDEX(char(13)+char(10), @SyscomText,

@BasePos)

--如果找到回车

IF @CurrentPos != 0

BEGIN

--如果@Lines的长度的新值比设置的大就插入@Lines目前的内容并继续

While (isnull(LEN(@Line),0) + @BlankSpaceAdded +

@CurrentPos-@BasePos + @LFCR) > @DefinedLength

BEGIN

SELECT @AddOnLen = @DefinedLength-(isnull(LEN(@Line),0) +

@BlankSpaceAdded)

INSERT #CommentText VALUES

( @LineId,

isnull(@Line, N'') + isnull(SUBSTRING(@SyscomText,

@BasePos, @AddOnLen), N''))

SELECT @Line = NULL, @LineId = @LineId + 1,

@BasePos = @BasePos + @AddOnLen, @BlankSpaceAdded = 0

END

SELECT @Line = isnull(@Line, N'') +

isnull(SUBSTRING(@SyscomText, @BasePos, @CurrentPos-@BasePos + @LFCR), N'')

SELECT @BasePos = @CurrentPos+2

INSERT #CommentText VALUES( @LineId, @Line )

SELECT @LineId = @LineId + 1

SELECT @Line = NULL

END

ELSE

--如果回车没找到

BEGIN

IF @BasePos <= @TextLength

BEGIN

--如果@Lines长度的新值大于定义的长度

While (isnull(LEN(@Line),0) + @BlankSpaceAdded +

@TextLength-@BasePos+1 ) > @DefinedLength

BEGIN

SELECT @AddOnLen = @DefinedLength -

(isnull(LEN(@Line),0) + @BlankSpaceAdded)

INSERT #CommentText VALUES

( @LineId,

isnull(@Line, N'') + isnull(SUBSTRING(@SyscomText,

@BasePos, @AddOnLen), N''))

SELECT @Line = NULL, @LineId = @LineId + 1,

@BasePos = @BasePos + @AddOnLen, @BlankSpaceAdded =

0

END

SELECT @Line = isnull(@Line, N'') +

isnull(SUBSTRING(@SyscomText, @BasePos, @TextLength-@BasePos+1 ), N'')

if LEN(@Line) < @DefinedLength and charindex(' ',

@SyscomText, @TextLength+1 ) > 0

BEGIN

SELECT @Line = @Line + ' ', @BlankSpaceAdded = 1

END

END

END

END

FETCH NEXT FROM ms_crs_syscom into @SyscomText

END

IF @Line is NOT NULL

INSERT #CommentText VALUES( @LineId, @Line )

select Text from #CommentText order by LineId

CLOSE ms_crs_syscom

DEALLOCATE ms_crs_syscom

DROP TABLE #CommentText

-- -------------------------------------

--结束从sp_helptext提取

-- -------------------------------------

--删除用短横线创建的存储过程并重建原始的存储过程

ROLLBACK TRAN

DROP TABLE #output

END



2.启用sqlserver的dac,远程dac启用方法

在查询分析器里运行

EXEC sp_configure 'remote admin connections', 1;
RECONFIGURE;

3.然后开一个 数据库引擎查询(database engine query),切记这个查询和一般的查询不一样

接下来在弹开的数据库连接对话框里

“服务器名称 ”这一栏里面输入“admin:数据库ip地址或别名”,其他和平时连接一样

4. 这步你懂的 exec sp_decrypt '要破解的存储过程名字'

人气教程排行