Visualizing the content of encrypted stored procedures

Probably you were a bit curious about it and decided to click here, right? This is a very recurrent question on Microsoft forums, where people who maybe by mistake encrypted all of the stored procedures, or maybe you support a 3rd party application and there is an particular stored procedure killing the performance of your server and you just wanna know what the same is doing?

Independent of what you want to do, let me show you here how can you manage to see the content of an encrypted procedure.

Let’s suppose that you have this stored procedure created.

image

In Management Studio, you can see it that it is encrypted.

image

sp_helptext is also not helping you.

image

Well, if you really want to see it, here is the thing. Download SQL Prompt from Red-Gate. After you have downloaded and installed the tool, restart your Management Studio and scrool the mouse over the procedure name as you can see in the below screen.

image

When you see the procedure name popping up, just click in the hyperlink created and you will be able to see the procedure text even if it was encrypted.

image

Cool, right?

Well, from one side o fthe things this can be very handy, but also this can bring problems, where things should not be seen.

I hope you liked and see you around Open-mouthed smile

About Marcos Freccia

MVP em SQL Server (Data Plataform) , especialista em SQL Server, e atualmente trabalhando com Microsoft Azure!

Posted on March 1, 2018, in Dicas, Red Gate, Scripts, SQL Server, VirtualPass and tagged , , , . Bookmark the permalink. Leave a comment.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s

%d bloggers like this: