AppFriendlyName=" default application "
was added to the following code:
if you are from the search engine here, I believe that you must be very anxious, nonsense not say, straight into the theme. The rest I finally said to.
first you can create a HTML file upload to the server through the website open, such as found in this file with iframe code that move.
is the first method: check the IIS document
AuthFlags=" AuthAnonymous |; AuthNTLM"
ARP attackA footer
tip: I discussed here is blog recently attacked by the ARP example, bored to death. The form of iframe site was linked to horse, pop up a large number of pornographic websites, problems appeared in 11 hours, 11 hours in this tragic exploration.
AccessFlags=" AccessRead |; AccessScript"
note the red box, no special document footer is not be enabled, if you see here check pointing to a local HTML file, you can open to a local file to see if the Trojan virus code.
second methods: check the MetaBase.xml file
and I discussed here is blog recently attacked by the ARP example, bored to death. The form of iframe site was linked to horse, pop up a large number of pornographic websites, problems appeared in 11 hours, 11 hours in this tragic exploration.
MetaBase.xml is a configuration file, the IIS position is:
server almost all the websites open the web page HTML is automatically add like this style of code, some in the head, some in the rear, some anti-virus software will open the report drug, open the HTML or ASP, PHP page, the source could not find this code.