A. 網站後台密碼忘了怎麼改
需要登錄phpmyadmin,找到管理員數據表,一般起名為admin,或找相似的表,然後找到密碼欄位,一般取名為password,在這里改,如果是md5加密就改成md5形式的(可以到站長工具找md5加密工具),這樣就ok了
ps:改密碼在ftp里沒什麼用,密碼之類的一般都存在資料庫里。另:非專業人士盡量別改,以免造成更大的錯誤
B. 知道RAS的公鑰,如何通過程序加密一個字元串呀 私鑰在別人手上,不用我解密。使用軟體VS2005/CBuilder
//------------rsa.h--------------------
#ifndef RSAH
#define RSAH
//-------------------------------------------------------------------------
#include <iostream>
#include <windows.h>
#include <wincrypt.h>
typedef struct tagRSAFileStruct
{
char m_szVersion[11];
char m_szDate[21];
char m_szPrivider[61];
char m_szCustomer[61];
char m_szUserID[21];
char m_szPubKey[2049];
char m_szPrvKey[2049];
char m_szMD5Str[33];
}RSAFile;
//-------------------------------------------------------------------------
class XRSA
{
private:
unsigned int m_iErrorNo;
unsigned char Char2Hex(unsigned char byVal);
void Char2HexStr(unsigned char byVal, char * pszBuffer);
char *m_pszPubKey, *m_pszPrvKey;
char *m_pszOutData;
public:
XRSA();
~XRSA();
public:
int GetErrorNo();
//解密文件
int Decrypt(unsigned char *pszKey, //解密用密鑰
DWORD dwKeyLen, //密鑰長度
unsigned char *pszInBuffer,//輸入密文文件
DWORD dwInLen,//輸入密文文件長度
unsigned char **pszOutBuffer, //輸出明文文件
DWORD &dwOutLen //輸出明文文件長度
);
//加密文件
int Encrypt(unsigned char *pszKey,//加密用的密鑰
DWORD dwKeyLen , //加密密鑰長度
unsigned char *pszInBuffer,//輸入明文文件
DWORD dwInLen, //輸入明文文件長度
unsigned char **pszOutBuffer ,//輸出密文文件
DWORD &dwOutLen //輸出密文文件長度
);
int GenerateRSAKey(unsigned char **pszPubKey, //公鑰文件
DWORD &dwPubKeyLen, //公鑰的長度
unsigned char **dwPrvKey,//私鑰文件
DWORD &dwPrvKeyLen //私鑰的長度
);
public:
int HexStr2Hex(char *pszBuffer, //Hex data buffer
int iInLen, //Hex data len
char *pszHexBuffer //以輸出結果,以字元串形式
//必須保證該空間至少是輸入長度的2倍+1
);
int Hex2HexStr(char *pszHexBuffer, int iInLen, char *pszBuffer);
};
//-------------------------------------------------------------------------
#endif
//------------rsa.cpp--------------------
#include "RSA.H"
#include "stdio.h"
unsigned char XRSA::Char2Hex(unsigned char val)
{
if (val >= '0' && val <= '9')
return val - 0x30;
else if (val >= 'A' && val <= 'F')
return (val - 0x41 + 10);
else if (val >= 'a' && val <= 'f')
return (val - 0x61 + 10);
else
return 0;
}
void XRSA::Char2HexStr(unsigned char val, char * buff)
{
sprintf(buff, "%02x", val);
buff[2]=0;
return;
}
int XRSA::HexStr2Hex(char *buff, int len, char *hexbuff)
{
unsigned char hi4, low4, byval;
int i,j;
for (i=0, j=0; i<len; i+=2, j++)
{
hi4 = Char2Hex(buff[i]);
if (i<len)
low4 = Char2Hex(buff[i+1]);
else
low4 = 0;
byval = hi4 * 0x10 + low4;
hexbuff[j] = byval;
}
return j;
}
int XRSA::Hex2HexStr(char *hex, int len, char *buff)
{
char tempbuff[10];
memset(buff, 0, len*2+1);
for (int i=0; i<len; i++)
{
Char2HexStr(hex[i], tempbuff);
strcat(buff, tempbuff);
}
return len * 2;
}
//-----------------------------------------------------------
XRSA::XRSA()
{
m_iErrorNo = 0;
m_pszPubKey = NULL;
m_pszPrvKey = NULL;
m_pszOutData = NULL;
}
//-----------------------------------------------------------
XRSA::~XRSA()
{
if(m_pszPubKey != NULL)
{
delete []m_pszPubKey;
m_pszPubKey = NULL;
}
if(m_pszPrvKey != NULL)
{
delete []m_pszPrvKey;
m_pszPrvKey = NULL;
}
if(m_pszOutData != NULL)
{
delete []m_pszOutData;
m_pszOutData = NULL;
}
}
//-----------------------------------------------------------
int XRSA::Decrypt(unsigned char *pszKey, //解密用密鑰, HexStr
DWORD dwKeyLen, //密鑰長度
unsigned char *pszInBuffer, //輸入密文緩沖區
DWORD dwInLen, //輸入密文長度
unsigned char **pszOutBuffer, //輸出明文
DWORD &dwOutLen //輸出明文長度
)
{
//var begin ------------------------------------------------
HCRYPTPROV t_hCryptProv; //臨時的密鑰容器句柄
HCRYPTKEY t_hKey; //臨時的密鑰句柄
int result = 0; //返回結果值,如果正常返回為0
unsigned char *tempDivSrcData;
int j=0;
int t=0;
char *pszRealKey, *pszPointer;
//var end -------------------------------------------------
pszRealKey = new char[dwKeyLen];
dwKeyLen = HexStr2Hex(pszKey, dwKeyLen, pszRealKey);
//連接密鑰容器
/*不管密鑰容器存在不存在先幹掉它再生成,如果生成失敗就返回-1*/
CryptAcquireContext(&t_hCryptProv,"Mecrt Temp CSP",NULL, PROV_RSA_FULL,CRYPT_DELETEKEYSET);
if(!CryptAcquireContext(&t_hCryptProv,"Mecrt Temp CSP",NULL, PROV_RSA_FULL,CRYPT_NEWKEYSET))
{
m_iErrorNo = GetLastError();
delete []pszRealKey;
return -1;
}
//------------------------------------------------------------
/*倒入解密用的密鑰文件,如果失敗返回-2*/
if(!CryptImportKey(t_hCryptProv, pszRealKey, dwKeyLen, 0, 0,&t_hKey))
{
m_iErrorNo = GetLastError();
delete []pszRealKey;
return -2;
}
//-------------------------------------------------------------
if(m_pszOutData != NULL)
{
delete []m_pszOutData;
}
m_pszOutData = new char[dwInLen * 128 + 1];
*pszOutBuffer = m_pszOutData;
pszPointer = m_pszOutData;
tempDivSrcData = new unsigned char[128+1];
//-------------------------------------------------------------
// 數據解密
//------------------------------------------------------------------------
for(int i=0; i*128 < (int)dwInLen;i++)
{
pszInBuffer += i*128;
if( (dwInLen - i*128) > 0 ) j = 128;
else j = (dwInLen - i*128);
memset(tempDivSrcData,0x00,128+1);
memcpy(tempDivSrcData, pszInBuffer, j);
if(!CryptDecrypt(t_hKey, 0, true, 0, tempDivSrcData,(unsigned long *)&j))
{
m_iErrorNo = GetLastError();
result = -2;
break;
}
t += j;
memcpy(pszPointer + j, tempDivSrcData,j);
pszPointer = pszPointer + j;
}
//--------------------------------------------------
dwOutLen = t;
//----------------------------------------------------------------
//-------------------------結束清空垃圾----------------------
delete tempDivSrcData;
delete []pszRealKey;
CryptDestroyKey(t_hKey);
CryptReleaseContext(t_hCryptProv,0);
return result;
}
//---------------------------------------------------------------------------
int XRSA::Encrypt(unsigned char *pszKey, //加密用的密鑰,HexStr
DWORD dwKeyLen , //加密密鑰長度
unsigned char *pszInBuffer, //需要加密的緩沖區
DWORD dwInLen, //需要加密的緩沖區長度
unsigned char **pszOutBuffer, //輸出密文
DWORD &dwOutLen //輸出密文長度
)
{
//var begin ------------------------------------------------
HCRYPTPROV t_hCryptProv; //臨時的密鑰容器句柄
HCRYPTKEY t_hKey; //臨時的密鑰句柄
int result = 0; //返回結果值,如果正常返回為0
unsigned char *tempDivSrcData;
int j=0;
int t=0;
char *pszRealKey, *pszPointer;
//var end -------------------------------------------------
pszRealKey = new char[dwKeyLen];
dwKeyLen = HexStr2Hex(pszKey, dwKeyLen, pszRealKey);
//連接密鑰容器
/*不管密鑰容器存在不存在先刪除它再生成,如果生成失敗就返回-1*/
CryptAcquireContext(&t_hCryptProv,"Mecrt Temp CSP",NULL, PROV_RSA_FULL,CRYPT_DELETEKEYSET);
if(!CryptAcquireContext(&t_hCryptProv,"Mecrt Temp CSP",NULL, PROV_RSA_FULL,CRYPT_NEWKEYSET))
{
m_iErrorNo = GetLastError();
delete []pszRealKey;
return -1;
}
//------------------------------------------------------------
/*倒入解密用的密鑰文件,如果失敗返回-2*/
if(!CryptImportKey(t_hCryptProv, pszRealKey, dwKeyLen, 0, 0, &t_hKey))
{
m_iErrorNo = GetLastError();
delete []pszRealKey;
return -2;
}
//-------------------------------------------------------------
if(m_pszOutData != NULL)
{
delete []m_pszOutData;
}
m_pszOutData = new char[dwInLen * 128 + 1];
*pszOutBuffer = m_pszOutData;
pszPointer = m_pszOutData;
tempDivSrcData = new unsigned char[128+1];
//-------------------------------------------------------------
// 數據加密
for(int i=0; i*117 < (int)dwInLen;i++)
{
pszInBuffer += i * 117;
if( (dwInLen - i*117) > 0 ) j = 117;
else j = (dwInLen - i*117);
memset(tempDivSrcData,0x00,128+1);
memcpy(tempDivSrcData, pszInBuffer, j);
if(!CryptEncrypt(t_hKey, 0, true, 0, tempDivSrcData, (unsigned long *)&j, 128))
{
m_iErrorNo = GetLastError();
result = -3;
break;
}
t += j;
memcpy(pszPointer,tempDivSrcData,j);
pszPointer = pszPointer + j;
}
dwOutLen = t;
//----------------------------------------------------------------
//-------------------------結束清空垃圾----------------------
delete []tempDivSrcData;
delete []pszRealKey;
CryptDestroyKey(t_hKey);
CryptReleaseContext(t_hCryptProv,0);
return result;
}
//---------------------------------------------------------------------------
int XRSA::GenerateRSAKey(unsigned char **pszPubKey, //公鑰數據,輸出HexStr
DWORD &dwPubKeyLen, //公鑰長度,輸出
unsigned char **dwPrvKey, //私鑰文件,輸出HexStr
DWORD &dwPrvKeyLen //私鑰長度,輸出
)
{
//-------------------------Var Begin----------------------------------
HCRYPTPROV hCryptProv; //密鑰容器CSP句柄
HCRYPTKEY hKey; //密鑰文件的句柄
int result = 0; //函數默認返回值為0表示正常結束
char * pszTempPubKey, * pszTempPrvKey;
//-------------------------Var End------------------------------------
CryptAcquireContext(&hCryptProv,"Mecrt CSP",NULL, PROV_RSA_FULL,CRYPT_DELETEKEYSET);
if(!CryptAcquireContext(&hCryptProv,"Mecrt CSP",NULL, PROV_RSA_FULL,CRYPT_NEWKEYSET))
{
m_iErrorNo = GetLastError();
return -1;
}
//-------------------------------------------------------------------------
if (!CryptGenKey(hCryptProv,AT_KEYEXCHANGE ,0x04000000 |CRYPT_EXPORTABLE,&hKey))
{
m_iErrorNo = GetLastError();
return -2;
}
//---------------檢查輸出Key的長度------------------------------------------
if(!CryptExportKey(hKey,NULL,PUBLICKEYBLOB,0, NULL, &dwPubKeyLen))
{
m_iErrorNo = GetLastError();
result = -3;
goto __END;
}
//----------------取PubKey的Hex值-------------------------------------------
pszTempPubKey = new char[dwPubKeyLen];
if(!CryptExportKey(hKey,NULL,PUBLICKEYBLOB,0, pszTempPubKey, &dwPubKeyLen))
{
m_iErrorNo = GetLastError();
result = -3;
delete pszTempPubKey;
goto __END;
}
//------------輸出PubKey至HexStr--------------------------------------------
if(m_pszPubKey != NULL)
{
delete []m_pszPubKey;
}
m_pszPubKey = new char[dwPubKeyLen * 2 + 1];
dwPubKeyLen = Hex2HexStr(pszTempPubKey, dwPubKeyLen, m_pszPubKey);
//---------------檢查輸出Key的長度------------------------------------------
if(!CryptExportKey(hKey, NULL, PRIVATEKEYBLOB,0, NULL, &dwPrvKeyLen))
{
m_iErrorNo = GetLastError();
result = -4;
delete pszTempPubKey;
goto __END;
}
//----------------取PubKey的Hex值-------------------------------------------
pszTempPrvKey = new char[dwPrvKeyLen];
if(!CryptExportKey(hKey, NULL, PRIVATEKEYBLOB, 0, pszTempPrvKey, &dwPrvKeyLen))
{
m_iErrorNo = GetLastError();
result = -4;
delete pszTempPubKey;
delete pszTempPrvKey;
goto __END;
}
//------------輸出PrvKey至HexStr--------------------------------------------
if(m_pszPrvKey != NULL)
{
delete []m_pszPrvKey;
}
m_pszPrvKey = new char[dwPrvKeyLen * 2 + 1];
dwPrvKeyLen = Hex2HexStr(pszTempPrvKey, dwPrvKeyLen, m_pszPrvKey);
__END:
CryptDestroyKey(hKey);
CryptAcquireContext(&hCryptProv,"Mecrt CSP",NULL, PROV_RSA_FULL,CRYPT_DELETEKEYSET);
CryptReleaseContext(hCryptProv,0);
return result ;
}
//-------------------------------------------------------------------------
int XRSA::GetErrorNo()
{
return m_iErrorNo;
}
//----------------調用例子--------------------------
XRSA rsa;
rsa.Encrypt(.....);
C. 如何加密後台資料庫的方法
1,登陸網站空間的管理站點,也就是當時購買空間的官方網站。
2,進入用戶中心,找到資料庫管理。進入資料庫管理中心,高級管理,進入高級管理界面,也就是phpmyadmin
3,根據自己網站程序,選擇數據表名稱(主要用來控制網站後台的登陸,一般後綴為admin
userid是網站後台的登陸賬戶名。
4,在pwd處所出現的一長串代碼,就是通過md5加密32位數字串(有的是16位)
5,打開一個提供md5加密解密的網站,隨便輸入幾個數字,比如123456,點擊加密,此時所出現的,就是md5方式加密的字元串,我們對照數據表admin當中,pwd處字元串。看看和那個比較接近(大小寫和數位對比),可以發現是第三。
6復制第三處的字元串,將其粘貼在數據表admin的pwd處,可以看到數據表的修改提示。
7.就可以登陸網站後台地址,賬號就是之前的帳戶名,密碼則是剛剛修改過的123456了。