解密SQL Server存储过程等对象(一)

2014-11-24 11:10:12 · 作者: · 浏览: 2
解密SQL Server存储过程等对象
CREATE PROC [dbo].[DP_DecryptObj]
(
@ObjectName VARCHAR(200),
@flag INT=1
)
AS
IF @flag = 1
BEGIN
PRINT '警告:该存储过程会删除并重建原始的存储过程。'
PRINT ' 在运行该存储过程之前确保你的 数据库有一个备份。'
PRINT ' 该存储过程通常应该运行在产品环境的一个备份的非产品环境下。'
PRINT ' 为了运行这个存储过程,将参数@flag的值更改为0。'
PRINT '注意:请使用DAC连接方式执行此过程。'
RETURN 0
END
DECLARE @PROTEXT VARCHAR(MAX),@sql VARCHAR(MAX),@droptype VARCHAR(50)
DECLARE @intProcSpace bigint,
@t bigint,
@procNameLength INT
SELECT @procNameLength = datalength(@ObjectName) + 29
DECLARE @real_01 nvarchar(max),
@fake_01 nvarchar(max),
@fake_encrypt_01 nvarchar(max),
@real_decrypt_01 nvarchar(max),@real_decrypt_01a nvarchar(max)
declare @objtype varchar(2),@ParentName nvarchar(max)
select @real_decrypt_01a = ''
--提取对象的类型如是存储过程还是函数,如果是触发器,还要得到其父对象的名称
select @objtype=type,@parentname=object_name(parent_object_id)
from sys.objects where [object_id]=object_id(@ObjectName)
-- 从sys.sysobjvalues里提出 加密的imageva l记录
SET @real_01=(SELECT top 1 imageva l FROM sys.sysobjvalues WHERE objid = object_id(@ObjectName) and valclass = 1 order by subobjid)
--创建一个临时表
create table #output (
[ident] [int] IDENTITY (1, 1) NOT NULL ,
[real_decrypt] NVARCHAR(MAX)
)
--开始一个事务,稍后回滚
BEGIN TRAN
/*******以下是修改部分,二部的代码原来解密函数有问题,就直接把王成辉的版本,然后增加加了对IF和TF的解密*******/
--更改原始的存储过程,用短横线替换
if @objtype='P'
BEGIN
SET @fake_01='ALTER PROCEDURE '+ @ObjectName +' WITH ENCRYPTION AS select 1
/**//*'+REPLICATE(cast('*'as nvarchar(max)), datalength(@real_01) /2 - @procNameLength)+'*/'
SET @droptype='DROP PROCEDURE'
END
else if @objtype='V'
BEGIN
SET @fake_01='ALTER VIEW '+ @ObjectName +' WITH ENCRYPTION AS select 1 as col
/**//*'+REPLICATE(cast('*'as nvarchar(max)), datalength(@real_01) /2 - @procNameLength)+'*/'
SET @droptype='DROP VIEW'
END
else if @objtype='TR'
BEGIN
SET @fake_01='ALTER TRIGGER '+ @ObjectName +' ON '+@parentname+'WITH ENCRYPTION AFTER INSERT AS RAISERROR (''N'',16,10)
/**//*'+REPLICATE(cast('*'as nvarchar(max)), datalength(@real_01) /2 - @procNameLength)+'*/'
SET @droptype='DROP TRIGGER'
END
else if @objtype='FN'
BEGIN
SET @fake_01='ALTER FUNCTION '+ @ObjectName +'() RETURNS INT WITH ENCRYPTION AS BEGIN RETURN 1
/**//*'+REPLICATE(cast('*'as nvarchar(max)), datalength(@real_01) /2 - @procNameLength)+'*/ END'
SET @droptype='DROP FUNCTION'
END
else if @objtype='IF'
BEGIN
SET @fake_01='ALTER FUNCTION '+ @ObjectName +'() RETURNS TABLE WITH ENCRYPTION AS RETURN (SELECT 0 AS col)
/**//*'+REPLICATE(cast('*'as nvarchar(max)), datalength(@real_01) /2 - @procNameLength)+'*/'
SET @droptype='DROP FUNCTION'
END
else if @objtype='TF'
BEGIN
SET @fake_01='ALTER FUNCTION '+ @ObjectName +'() RETURNS @Temp TABLE(ID INT) WITH ENCRYPTION AS BEGIN RETURN
/**//*'+REPLICATE(cast('*'as nvarchar(max)), datalength(@real_01) /2 - @procNameLength)+'*/ END'
SET @droptype='DROP FUNCTION'
END
EXECUTE (@fake_01)
--从sys.sysobjvalues里提出加密的假的
SET @fake_encrypt_01=(SELECT top 1 imageva l FROM sys.sysobjvalues WHERE objid =
object_id(@ObjectName) and valclass = 1 order by subobjid )
if @obj