Introduction - If you have any usage issues, please Google them yourself
One advantage of the vulnerability of the worm. LION worm with some resemblance, you need to register themselves to a FTP host ,,,,,, run: run directly (without parameters) will scan the local host IP starting 100, and modify the page, spread with parameters Run: iis 202.97.233.0 202.97.233.254 This will scan the IP section of the host and the implementation of the attack.