• SQL2000数据库密码被替换,重置密码提示未能找到存储过程sp_password解决方案


    利用windows身份验证进入查询分析器后在master数据库下运行如下脚本:

     1 create procedure sp_password
     2 @old sysname = NULL, -- the old (current) password
     3 @new sysname, -- the new password
     4 @loginame sysname = NULL -- user to change password on
     5 as
     6 -- SETUP RUNTIME OPTIONS / DECLARE VARIABLES --
     7 set nocount on
     8 declare @self int
     9 select @self = CASE WHEN @loginame is null THEN 1 ELSE 2 END
    10 
    11 -- RESOLVE LOGIN NAME
    12 if @loginame is null
    13 select @loginame = suser_sname()
    14 
    15 -- CHECK PERMISSIONS (SecurityAdmin per Richard Waymire) --
    16 IF (not is_srvrolemember('securityadmin') = 1)
    17 AND not @self = 1
    18 begin
    19 dbcc auditevent (107, @self, 0, @loginame, NULL, NULL, NULL)
    20 raiserror(15210,-1,-1)
    21 return (1)
    22 end
    23 ELSE
    24 begin
    25 dbcc auditevent (107, @self, 1, @loginame, NULL, NULL, NULL)
    26 end
    27 
    28 -- DISALLOW USER TRANSACTION --
    29 set implicit_transactions off
    30 IF (@@trancount > 0)
    31 begin
    32 raiserror(15002,-1,-1,'sp_password')
    33 return (1)
    34 end
    35 
    36 -- RESOLVE LOGIN NAME (disallows nt names)
    37 if not exists (select * from master.dbo.syslogins where
    38 loginname = @loginame and isntname = 0)
    39 begin
    40 raiserror(15007,-1,-1,@loginame)
    41 return (1)
    42 end
    43 
    44 -- IF non-SYSADMIN ATTEMPTING CHANGE TO SYSADMIN, REQUIRE PASSWORD (218078) --
    45 if (@self <> 1 AND is_srvrolemember('sysadmin') = 0 AND exists
    46 (SELECT * FROM master.dbo.syslogins WHERE loginname = @loginame and isntname = 0
    47 AND sysadmin = 1) )
    48 SELECT @self = 1
    49 
    50 -- CHECK OLD PASSWORD IF NEEDED --
    51 if (@self = 1 or @old is not null)
    52 if not exists (select * from master.dbo.sysxlogins
    53 where srvid IS NULL and
    54 name = @loginame and
    55 ( (@old is null and password is null) or
    56 (pwdcompare(@old, password, (CASE WHEN xstatus&2048 = 2048 THEN 1 ELSE 0 END)) = 1) ) )
    57 begin
    58 raiserror(15211,-1,-1)
    59 return (1)
    60 end
    61 
    62 -- CHANGE THE PASSWORD --
    63 update master.dbo.sysxlogins
    64 set password = convert(varbinary(256), pwdencrypt(@new)), xdate2 = getdate(), xstatus = xstatus & (~2048)
    65 where name = @loginame and srvid IS NULL
    66 
    67 -- UPDATE PROTECTION TIMESTAMP FOR MASTER DB, TO INDICATE SYSLOGINS CHANGE --
    68 exec('use master grant all to null')
    69 
    70 -- FINALIZATION: RETURN SUCCESS/FAILURE --
    71 if @@error <> 0
    72 return (1)
    73 raiserror(15478,-1,-1)
    74 return (0) -- sp_password
    View Code

    命令执行成功后,sa的密码是null,可以去企业管理器-安全-sa -写入新密码;

    这次被病毒入侵是因为sa的密码太过简单 123456类似,引以为戒!

  • 相关阅读:
    变量作用域
    模块化编程-函数
    递归
    变量
    形参和实参
    函数返回值
    node.js+yarn环境centos7快速部署
    LINUX磁盘添加挂载
    分布式存储MINIO集群部署实例
    Docker取消默认https连接
  • 原文地址:https://www.cnblogs.com/yanghucheng/p/4112873.html
Copyright © 2020-2023  润新知