--------------------------------------------------------------------
------------- (c) UNICODE exploit for IIS 5.0/4.0 by BoloTron
------
--------------------------------------------------------------------
Usage of the wicked device:
Notice: Undefined variable: argv in /mnt/data/html/sentry/test.php on line 152
Notice: Trying to access array offset on value of type null in /mnt/data/html/sentry/test.php on line 152
-t www.victim.vic
Notice: Undefined variable: argv in /mnt/data/html/sentry/test.php on line 153
Notice: Trying to access array offset on value of type null in /mnt/data/html/sentry/test.php on line 153
-t www.victim.vic -p proxy:port
Notice: Undefined variable: argv in /mnt/data/html/sentry/test.php on line 154
Notice: Trying to access array offset on value of type null in /mnt/data/html/sentry/test.php on line 154
www.victim.vic comand variant_number
Notice: Undefined variable: argv in /mnt/data/html/sentry/test.php on line 155
Notice: Trying to access array offset on value of type null in /mnt/data/html/sentry/test.php on line 155
-p proxy:port www.victim.vic comand variant_number
Options:
-t --> Test the vulnerability (Try known variants till find the good
one)
-p --> Attack through proxy
Use Mode:
1) Test the host and get the variants number in case
vulnerability exists
2) Attack with command and variants number (optionaly you can use
proxy)
Note : When you specify a command with spaces, replace spaces
with low script "_"
Notice: Undefined variable: argv in /mnt/data/html/sentry/test.php on line 167
Notice: Trying to access array offset on value of type null in /mnt/data/html/sentry/test.php on line 167
and you must double the backslash "\".
Example -p proxy.prx:3128 www.victima.com dir_c:\\inetpub 49
Thanks to An-tonio for the proxy support.
Bug discover by Anonymous Post.
Notice: Undefined variable: argv in /mnt/data/html/sentry/test.php on line 170
Notice: Trying to access array offset on value of type null in /mnt/data/html/sentry/test.php on line 170
TYPE spanish, for Spanish help.