中国网络渗透测试联盟
标题:
web.Config加密解密最简单实用方法
[打印本页]
作者:
admin
时间:
2013-8-5 15:33
标题:
web.Config加密解密最简单实用方法
web.config的文件多数的时候不希望别人看到,下面提供一个加密,解密的语句,简洁方便实用,先看到效果,至于加密的原理其他的网页上做了很多说明,这里只演示效果。
# `, Z' P! Q3 d; S& a: v ^- q% e$ l
加密前的connectionStrings节点
. N- i( t5 g+ ^7 i' S. c
代码
( w$ W. d) c) S% ?' l+ Q
<connectionStrings>
3 _, b9 W( {2 C$ q2 X! e! c! J5 m2 I
<add name="SQLConnString1" connectionString="server=WJW-PC\SQL2008;user id=sa;password=12345;Initial Catalog=dbFASH;min pool size=4;max pool size=400;" />
/ ^, v! }+ G: o0 J8 P; K: `1 M
<add name="eziyaConnectionString1" connectionString="Data Source=HOME-COMPUTER;Initial Catalog=dbFASH;Integrated Security=True;MultipleActiveResultSets=False
acket Size=4096;Application Name="Microsoft SQL Server Management Studio""
2 \/ {" i$ g2 L1 V7 h
providerName="System.Data.SqlClient" />
5 U9 _. [/ `" ~9 @( P
<add name="eziyaConnectionString2" connectionString="Data Source=192.168.1.200;Initial Catalog=dbFASH
ersist Security Info=True;User ID=taoka;MultipleActiveResultSets=False
acket Size=4096;Application Name="Microsoft SQL Server Management Studio""
0 y6 {. ]) k; ^* ?7 z4 }3 m: T6 ]
providerName="System.Data.SqlClient" />
4 w, M% H5 ^, A3 ^, u# V6 h! G
<add name="eziyaConnectionString3" connectionString="Data Source=192.168.61.160;Initial Catalog=dbFASH
ersist Security Info=True;User ID=sa;MultipleActiveResultSets=False
acket Size=4096;Application Name="Microsoft SQL Server Management Studio""
. z4 U% s# _; Z" N1 _$ m1 M! C5 i* y
providerName="System.Data.SqlClient" />
+ Y5 U* `1 a9 i3 e v: j1 i; b
</connectionStrings>
% h7 i+ P3 \3 t: ~; k
加密后的connectionStrings的节点
: c# R8 H/ b n6 s
代码
6 n3 ]* E$ H9 o1 H& l
<connectionStrings configProtectionProvider="RsaProtectedConfigurationProvider">
( e) Q( g. B$ d- O9 m
<EncryptedData Type="
http://www.w3.org/2001/04/xmlenc#Element
"
4 S% K( R8 K( {7 T
xmlns="
http://www.w3.org/2001/04/xmlenc#">
;
* f) Z/ f- U; U2 T
<EncryptionMethod Algorithm="
http://www.w3.org/2001/04/xmlenc#tripledes-cbc
" />
. D9 P! M4 D7 c. _
<KeyInfo xmlns="
http://www.w3.org/2000/09/xmldsig#">
;
: E$ B$ ~( V3 _+ ? v& R
<EncryptedKey xmlns="
http://www.w3.org/2001/04/xmlenc#">
;
7 e* G W: _9 M$ P3 N6 g
<EncryptionMethod Algorithm="
http://www.w3.org/2001/04/xmlenc#rsa-1_5
" />
1 W2 e' M$ v' ^
<KeyInfo xmlns="
http://www.w3.org/2000/09/xmldsig#">
;
, ^5 B% m# \* x4 r+ k
<KeyName>Rsa Key</KeyName>
" e' n! N! j4 R9 f# q p2 f
</KeyInfo>
# T7 o; P8 y% J( S. W6 B% l: p- Q
<CipherData>
- H9 \& Q" l6 i- _3 h7 G8 {( `5 c
<CipherValue>FOkydQFNniZvq71ua4XapuVCUrJFOARkXeqqwyKFoP+NGXGewehxYW0zTzIn/j+YCvH/r6ABoE/AfWMMEDyr81R1mhi4ckXbiJ2BvW612/W7f7Wkqj+FDwse+lgAISHZ5HfspaY1LBvKYAu1VEm6Iu6NlT35TPnjxFf+p5Apf0E=</CipherValue>
" `, Q8 t% D: k" I+ j
</CipherData>
; j" I$ {: d& A
</EncryptedKey>
9 q) B( U1 d% j9 W% s
</KeyInfo>
! D- f7 x" q) p% |3 o! U
<CipherData>
* |- t2 `* X0 I- Z. R4 O' {
<CipherValue>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</CipherValue>
0 B8 h* j% C+ V* p
</CipherData>
4 j) N6 P( p- L* ~* U
</EncryptedData>
- i. S3 {# M3 b6 P* S9 o* w
</connectionStrings>
* [6 _8 B7 t) O) p! c# O' F
完全看不到连接的信息!
( i! E$ |% i( k. C" t W
下面是两个.bat批处理文件
% n. a! B3 x2 y |! l+ g
加密:
V6 Z0 O7 `% k6 d; v6 n) q
@echo off
3 H! C8 X: a$ q5 ^1 f8 G
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\aspnet_regiis.exe -pef "connectionStrings" "E:\code\proj\Web"
8 P/ r" }+ o$ x3 S/ n* {- ]
解密:
! Y+ U d; k( C$ F0 i
@echo off
/ C" t& C; P+ Y2 N1 @! m b4 ]" w
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\aspnet_regiis.exe -pdf "connectionStrings" "E:\code\proj\Web"
! Q7 H' r& A* Y. n/ Z5 D0 \
PAUSE
+ j" f: W( l9 V3 G Y* W
直接将语句拷贝到.BAT文件中,E:\code\proj\Web为相应的web.config所在的路径,只能在一台电脑上操作,否则不可逆
作者:
Anthony~
时间:
2013-8-5 19:31
好方法。我正好刚遇到这个问题
欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/)
Powered by Discuz! X3.2