MS Office 2013-VBA密码安全

MS Office 2013-VBA密码安全,vba,excel,ms-word,ms-office,Vba,Excel,Ms Word,Ms Office,我想知道MS Office 2013上的VBA密码有多安全 我在网上搜索过,有很多网站都在卖软件,这可靠吗 我想围绕我的office文件开发一些安全性,这些安全性取决于内部的VBA代码,但是如果内部的VBA代码可以很容易地更改/查看,那么这样做是没有意义的 感谢使用此答案作为参考: 而不是做所有的十六进制的东西。你可以试试这个。它适用于任何文件(*.xls、*.xlsm、*.xlam…)。在Excel 2007、Excel 2010和Excel 2013上测试并运行-32位版本 打开包含锁定VB

我想知道MS Office 2013上的VBA密码有多安全

我在网上搜索过,有很多网站都在卖软件,这可靠吗

我想围绕我的office文件开发一些安全性,这些安全性取决于内部的VBA代码,但是如果内部的VBA代码可以很容易地更改/查看,那么这样做是没有意义的


感谢使用此答案作为参考:

而不是做所有的十六进制的东西。你可以试试这个。它适用于任何文件(*.xls、*.xlsm、*.xlam…)。在Excel 2007、Excel 2010和Excel 2013上测试并运行-32位版本

  • 打开包含锁定VBA项目的文件
  • 创建新的xlsm文件并将此代码存储在模块1中

    Option Explicit
    
    Private Const PAGE_EXECUTE_READWRITE = &H40
    
    Private Declare Sub MoveMemory Lib "kernel32" Alias "RtlMoveMemory" _
            (Destination As Long, Source As Long, ByVal Length As Long)
    
    Private Declare Function VirtualProtect Lib "kernel32" (lpAddress As Long, _
            ByVal dwSize As Long, ByVal flNewProtect As Long, lpflOldProtect As Long) As Long
    
    Private Declare Function GetModuleHandleA Lib "kernel32" (ByVal lpModuleName As String) As Long
    
    Private Declare Function GetProcAddress Lib "kernel32" (ByVal hModule As Long, _
            ByVal lpProcName As String) As Long
    
    Private Declare Function DialogBoxParam Lib "user32" Alias "DialogBoxParamA" (ByVal hInstance As Long, _
            ByVal pTemplateName As Long, ByVal hWndParent As Long, _
            ByVal lpDialogFunc As Long, ByVal dwInitParam As Long) As Integer
    
    Dim HookBytes(0 To 5) As Byte
    Dim OriginBytes(0 To 5) As Byte
    Dim pFunc As Long
    Dim Flag As Boolean
    
    Private Function GetPtr(ByVal Value As Long) As Long
        GetPtr = Value
    End Function
    
    Public Sub RecoverBytes()
        If Flag Then MoveMemory ByVal pFunc, ByVal VarPtr(OriginBytes(0)), 6
    End Sub
    
    Public Function Hook() As Boolean
        Dim TmpBytes(0 To 5) As Byte
        Dim p As Long
        Dim OriginProtect As Long
    
        Hook = False
    
        pFunc = GetProcAddress(GetModuleHandleA("user32.dll"), "DialogBoxParamA")
    
    
        If VirtualProtect(ByVal pFunc, 6, PAGE_EXECUTE_READWRITE, OriginProtect) <> 0 Then
    
            MoveMemory ByVal VarPtr(TmpBytes(0)), ByVal pFunc, 6
            If TmpBytes(0) <> &H68 Then
    
                MoveMemory ByVal VarPtr(OriginBytes(0)), ByVal pFunc, 6
    
                p = GetPtr(AddressOf MyDialogBoxParam)
    
                HookBytes(0) = &H68
                MoveMemory ByVal VarPtr(HookBytes(1)), ByVal VarPtr(p), 4
                HookBytes(5) = &HC3
    
                MoveMemory ByVal pFunc, ByVal VarPtr(HookBytes(0)), 6
                Flag = True
                Hook = True
            End If
        End If
    End Function
    
    Private Function MyDialogBoxParam(ByVal hInstance As Long, _
            ByVal pTemplateName As Long, ByVal hWndParent As Long, _
            ByVal lpDialogFunc As Long, ByVal dwInitParam As Long) As Integer
        If pTemplateName = 4070 Then
            MyDialogBoxParam = 1
        Else
            RecoverBytes
            MyDialogBoxParam = DialogBoxParam(hInstance, pTemplateName, _
                               hWndParent, lpDialogFunc, dwInitParam)
            Hook
        End If
    End Function
    
  • 回到您的VBA项目并享受


  • p/S:该代码归功于越南开发商Siwtom(昵称)。您可以将此代码转换为Excel加载项以供经常使用。

    这取决于具体情况。你认为攻击者的决心有多大?你会发现这很有趣。我想知道这件事是否容易做,这是我的问题。谢谢,看看那个链接,告诉我它有多容易?=;)-但我想这不适用于office 2013,或者是因为我错过了什么?我尝试了xlsm的上一个解决方案,但没有成功。我收到一条文件损坏的消息。
    Sub unprotected()
        If Hook Then
            MsgBox "VBA Project is unprotected!", vbInformation, "*****"
        End If
    End Sub