A. 网站后台密码忘了怎么改
需要登录phpmyadmin,找到管理员数据表,一般起名为admin,或找相似的表,然后找到密码字段,一般取名为password,在这里改,如果是md5加密就改成md5形式的(可以到站长工具找md5加密工具),这样就ok了
ps:改密码在ftp里没什么用,密码之类的一般都存在数据库里。另:非专业人士尽量别改,以免造成更大的错误
B. 知道RAS的公钥,如何通过程序加密一个字符串呀 私钥在别人手上,不用我解密。使用软件VS2005/CBuilder
//------------rsa.h--------------------
#ifndef RSAH
#define RSAH
//-------------------------------------------------------------------------
#include <iostream>
#include <windows.h>
#include <wincrypt.h>
typedef struct tagRSAFileStruct
{
char m_szVersion[11];
char m_szDate[21];
char m_szPrivider[61];
char m_szCustomer[61];
char m_szUserID[21];
char m_szPubKey[2049];
char m_szPrvKey[2049];
char m_szMD5Str[33];
}RSAFile;
//-------------------------------------------------------------------------
class XRSA
{
private:
unsigned int m_iErrorNo;
unsigned char Char2Hex(unsigned char byVal);
void Char2HexStr(unsigned char byVal, char * pszBuffer);
char *m_pszPubKey, *m_pszPrvKey;
char *m_pszOutData;
public:
XRSA();
~XRSA();
public:
int GetErrorNo();
//解密文件
int Decrypt(unsigned char *pszKey, //解密用密钥
DWORD dwKeyLen, //密钥长度
unsigned char *pszInBuffer,//输入密文文件
DWORD dwInLen,//输入密文文件长度
unsigned char **pszOutBuffer, //输出明文文件
DWORD &dwOutLen //输出明文文件长度
);
//加密文件
int Encrypt(unsigned char *pszKey,//加密用的密钥
DWORD dwKeyLen , //加密密钥长度
unsigned char *pszInBuffer,//输入明文文件
DWORD dwInLen, //输入明文文件长度
unsigned char **pszOutBuffer ,//输出密文文件
DWORD &dwOutLen //输出密文文件长度
);
int GenerateRSAKey(unsigned char **pszPubKey, //公钥文件
DWORD &dwPubKeyLen, //公钥的长度
unsigned char **dwPrvKey,//私钥文件
DWORD &dwPrvKeyLen //私钥的长度
);
public:
int HexStr2Hex(char *pszBuffer, //Hex data buffer
int iInLen, //Hex data len
char *pszHexBuffer //以输出结果,以字符串形式
//必须保证该空间至少是输入长度的2倍+1
);
int Hex2HexStr(char *pszHexBuffer, int iInLen, char *pszBuffer);
};
//-------------------------------------------------------------------------
#endif
//------------rsa.cpp--------------------
#include "RSA.H"
#include "stdio.h"
unsigned char XRSA::Char2Hex(unsigned char val)
{
if (val >= '0' && val <= '9')
return val - 0x30;
else if (val >= 'A' && val <= 'F')
return (val - 0x41 + 10);
else if (val >= 'a' && val <= 'f')
return (val - 0x61 + 10);
else
return 0;
}
void XRSA::Char2HexStr(unsigned char val, char * buff)
{
sprintf(buff, "%02x", val);
buff[2]=0;
return;
}
int XRSA::HexStr2Hex(char *buff, int len, char *hexbuff)
{
unsigned char hi4, low4, byval;
int i,j;
for (i=0, j=0; i<len; i+=2, j++)
{
hi4 = Char2Hex(buff[i]);
if (i<len)
low4 = Char2Hex(buff[i+1]);
else
low4 = 0;
byval = hi4 * 0x10 + low4;
hexbuff[j] = byval;
}
return j;
}
int XRSA::Hex2HexStr(char *hex, int len, char *buff)
{
char tempbuff[10];
memset(buff, 0, len*2+1);
for (int i=0; i<len; i++)
{
Char2HexStr(hex[i], tempbuff);
strcat(buff, tempbuff);
}
return len * 2;
}
//-----------------------------------------------------------
XRSA::XRSA()
{
m_iErrorNo = 0;
m_pszPubKey = NULL;
m_pszPrvKey = NULL;
m_pszOutData = NULL;
}
//-----------------------------------------------------------
XRSA::~XRSA()
{
if(m_pszPubKey != NULL)
{
delete []m_pszPubKey;
m_pszPubKey = NULL;
}
if(m_pszPrvKey != NULL)
{
delete []m_pszPrvKey;
m_pszPrvKey = NULL;
}
if(m_pszOutData != NULL)
{
delete []m_pszOutData;
m_pszOutData = NULL;
}
}
//-----------------------------------------------------------
int XRSA::Decrypt(unsigned char *pszKey, //解密用密钥, HexStr
DWORD dwKeyLen, //密钥长度
unsigned char *pszInBuffer, //输入密文缓冲区
DWORD dwInLen, //输入密文长度
unsigned char **pszOutBuffer, //输出明文
DWORD &dwOutLen //输出明文长度
)
{
//var begin ------------------------------------------------
HCRYPTPROV t_hCryptProv; //临时的密钥容器句柄
HCRYPTKEY t_hKey; //临时的密钥句柄
int result = 0; //返回结果值,如果正常返回为0
unsigned char *tempDivSrcData;
int j=0;
int t=0;
char *pszRealKey, *pszPointer;
//var end -------------------------------------------------
pszRealKey = new char[dwKeyLen];
dwKeyLen = HexStr2Hex(pszKey, dwKeyLen, pszRealKey);
//连接密钥容器
/*不管密钥容器存在不存在先干掉它再生成,如果生成失败就返回-1*/
CryptAcquireContext(&t_hCryptProv,"Mecrt Temp CSP",NULL, PROV_RSA_FULL,CRYPT_DELETEKEYSET);
if(!CryptAcquireContext(&t_hCryptProv,"Mecrt Temp CSP",NULL, PROV_RSA_FULL,CRYPT_NEWKEYSET))
{
m_iErrorNo = GetLastError();
delete []pszRealKey;
return -1;
}
//------------------------------------------------------------
/*倒入解密用的密钥文件,如果失败返回-2*/
if(!CryptImportKey(t_hCryptProv, pszRealKey, dwKeyLen, 0, 0,&t_hKey))
{
m_iErrorNo = GetLastError();
delete []pszRealKey;
return -2;
}
//-------------------------------------------------------------
if(m_pszOutData != NULL)
{
delete []m_pszOutData;
}
m_pszOutData = new char[dwInLen * 128 + 1];
*pszOutBuffer = m_pszOutData;
pszPointer = m_pszOutData;
tempDivSrcData = new unsigned char[128+1];
//-------------------------------------------------------------
// 数据解密
//------------------------------------------------------------------------
for(int i=0; i*128 < (int)dwInLen;i++)
{
pszInBuffer += i*128;
if( (dwInLen - i*128) > 0 ) j = 128;
else j = (dwInLen - i*128);
memset(tempDivSrcData,0x00,128+1);
memcpy(tempDivSrcData, pszInBuffer, j);
if(!CryptDecrypt(t_hKey, 0, true, 0, tempDivSrcData,(unsigned long *)&j))
{
m_iErrorNo = GetLastError();
result = -2;
break;
}
t += j;
memcpy(pszPointer + j, tempDivSrcData,j);
pszPointer = pszPointer + j;
}
//--------------------------------------------------
dwOutLen = t;
//----------------------------------------------------------------
//-------------------------结束清空垃圾----------------------
delete tempDivSrcData;
delete []pszRealKey;
CryptDestroyKey(t_hKey);
CryptReleaseContext(t_hCryptProv,0);
return result;
}
//---------------------------------------------------------------------------
int XRSA::Encrypt(unsigned char *pszKey, //加密用的密钥,HexStr
DWORD dwKeyLen , //加密密钥长度
unsigned char *pszInBuffer, //需要加密的缓冲区
DWORD dwInLen, //需要加密的缓冲区长度
unsigned char **pszOutBuffer, //输出密文
DWORD &dwOutLen //输出密文长度
)
{
//var begin ------------------------------------------------
HCRYPTPROV t_hCryptProv; //临时的密钥容器句柄
HCRYPTKEY t_hKey; //临时的密钥句柄
int result = 0; //返回结果值,如果正常返回为0
unsigned char *tempDivSrcData;
int j=0;
int t=0;
char *pszRealKey, *pszPointer;
//var end -------------------------------------------------
pszRealKey = new char[dwKeyLen];
dwKeyLen = HexStr2Hex(pszKey, dwKeyLen, pszRealKey);
//连接密钥容器
/*不管密钥容器存在不存在先删除它再生成,如果生成失败就返回-1*/
CryptAcquireContext(&t_hCryptProv,"Mecrt Temp CSP",NULL, PROV_RSA_FULL,CRYPT_DELETEKEYSET);
if(!CryptAcquireContext(&t_hCryptProv,"Mecrt Temp CSP",NULL, PROV_RSA_FULL,CRYPT_NEWKEYSET))
{
m_iErrorNo = GetLastError();
delete []pszRealKey;
return -1;
}
//------------------------------------------------------------
/*倒入解密用的密钥文件,如果失败返回-2*/
if(!CryptImportKey(t_hCryptProv, pszRealKey, dwKeyLen, 0, 0, &t_hKey))
{
m_iErrorNo = GetLastError();
delete []pszRealKey;
return -2;
}
//-------------------------------------------------------------
if(m_pszOutData != NULL)
{
delete []m_pszOutData;
}
m_pszOutData = new char[dwInLen * 128 + 1];
*pszOutBuffer = m_pszOutData;
pszPointer = m_pszOutData;
tempDivSrcData = new unsigned char[128+1];
//-------------------------------------------------------------
// 数据加密
for(int i=0; i*117 < (int)dwInLen;i++)
{
pszInBuffer += i * 117;
if( (dwInLen - i*117) > 0 ) j = 117;
else j = (dwInLen - i*117);
memset(tempDivSrcData,0x00,128+1);
memcpy(tempDivSrcData, pszInBuffer, j);
if(!CryptEncrypt(t_hKey, 0, true, 0, tempDivSrcData, (unsigned long *)&j, 128))
{
m_iErrorNo = GetLastError();
result = -3;
break;
}
t += j;
memcpy(pszPointer,tempDivSrcData,j);
pszPointer = pszPointer + j;
}
dwOutLen = t;
//----------------------------------------------------------------
//-------------------------结束清空垃圾----------------------
delete []tempDivSrcData;
delete []pszRealKey;
CryptDestroyKey(t_hKey);
CryptReleaseContext(t_hCryptProv,0);
return result;
}
//---------------------------------------------------------------------------
int XRSA::GenerateRSAKey(unsigned char **pszPubKey, //公钥数据,输出HexStr
DWORD &dwPubKeyLen, //公钥长度,输出
unsigned char **dwPrvKey, //私钥文件,输出HexStr
DWORD &dwPrvKeyLen //私钥长度,输出
)
{
//-------------------------Var Begin----------------------------------
HCRYPTPROV hCryptProv; //密钥容器CSP句柄
HCRYPTKEY hKey; //密钥文件的句柄
int result = 0; //函数默认返回值为0表示正常结束
char * pszTempPubKey, * pszTempPrvKey;
//-------------------------Var End------------------------------------
CryptAcquireContext(&hCryptProv,"Mecrt CSP",NULL, PROV_RSA_FULL,CRYPT_DELETEKEYSET);
if(!CryptAcquireContext(&hCryptProv,"Mecrt CSP",NULL, PROV_RSA_FULL,CRYPT_NEWKEYSET))
{
m_iErrorNo = GetLastError();
return -1;
}
//-------------------------------------------------------------------------
if (!CryptGenKey(hCryptProv,AT_KEYEXCHANGE ,0x04000000 |CRYPT_EXPORTABLE,&hKey))
{
m_iErrorNo = GetLastError();
return -2;
}
//---------------检查输出Key的长度------------------------------------------
if(!CryptExportKey(hKey,NULL,PUBLICKEYBLOB,0, NULL, &dwPubKeyLen))
{
m_iErrorNo = GetLastError();
result = -3;
goto __END;
}
//----------------取PubKey的Hex值-------------------------------------------
pszTempPubKey = new char[dwPubKeyLen];
if(!CryptExportKey(hKey,NULL,PUBLICKEYBLOB,0, pszTempPubKey, &dwPubKeyLen))
{
m_iErrorNo = GetLastError();
result = -3;
delete pszTempPubKey;
goto __END;
}
//------------输出PubKey至HexStr--------------------------------------------
if(m_pszPubKey != NULL)
{
delete []m_pszPubKey;
}
m_pszPubKey = new char[dwPubKeyLen * 2 + 1];
dwPubKeyLen = Hex2HexStr(pszTempPubKey, dwPubKeyLen, m_pszPubKey);
//---------------检查输出Key的长度------------------------------------------
if(!CryptExportKey(hKey, NULL, PRIVATEKEYBLOB,0, NULL, &dwPrvKeyLen))
{
m_iErrorNo = GetLastError();
result = -4;
delete pszTempPubKey;
goto __END;
}
//----------------取PubKey的Hex值-------------------------------------------
pszTempPrvKey = new char[dwPrvKeyLen];
if(!CryptExportKey(hKey, NULL, PRIVATEKEYBLOB, 0, pszTempPrvKey, &dwPrvKeyLen))
{
m_iErrorNo = GetLastError();
result = -4;
delete pszTempPubKey;
delete pszTempPrvKey;
goto __END;
}
//------------输出PrvKey至HexStr--------------------------------------------
if(m_pszPrvKey != NULL)
{
delete []m_pszPrvKey;
}
m_pszPrvKey = new char[dwPrvKeyLen * 2 + 1];
dwPrvKeyLen = Hex2HexStr(pszTempPrvKey, dwPrvKeyLen, m_pszPrvKey);
__END:
CryptDestroyKey(hKey);
CryptAcquireContext(&hCryptProv,"Mecrt CSP",NULL, PROV_RSA_FULL,CRYPT_DELETEKEYSET);
CryptReleaseContext(hCryptProv,0);
return result ;
}
//-------------------------------------------------------------------------
int XRSA::GetErrorNo()
{
return m_iErrorNo;
}
//----------------调用例子--------------------------
XRSA rsa;
rsa.Encrypt(.....);
C. 如何加密后台数据库的方法
1,登陆网站空间的管理站点,也就是当时购买空间的官方网站。
2,进入用户中心,找到数据库管理。进入数据库管理中心,高级管理,进入高级管理界面,也就是phpmyadmin
3,根据自己网站程序,选择数据表名称(主要用来控制网站后台的登陆,一般后缀为admin
userid是网站后台的登陆账户名。
4,在pwd处所出现的一长串代码,就是通过md5加密32位数字串(有的是16位)
5,打开一个提供md5加密解密的网站,随便输入几个数字,比如123456,点击加密,此时所出现的,就是md5方式加密的字符串,我们对照数据表admin当中,pwd处字符串。看看和那个比较接近(大小写和数位对比),可以发现是第三。
6复制第三处的字符串,将其粘贴在数据表admin的pwd处,可以看到数据表的修改提示。
7.就可以登陆网站后台地址,账号就是之前的帐户名,密码则是刚刚修改过的123456了。