IIS IDA-IDQ exploit

After successful exploitation an agent will be installed. The process being exploited is usually run as an IUSR or IWAM user, specially created for IIS to answer anonymous requests. If this condition is present, the newly deployed agent will run with an unprivileged user.
Exploit Platform
Exploit Type
Product Name