Step 1: Target Identification: The attacker identifies a web server running IIS 2.0 or 3.0.
Step 2: URL Crafting: The attacker crafts a URL targeting an ASP file, appending a period (.) to the end of the filename (e.g., http://example.com/vulnerable.asp.).
Step 3: Request Submission: The attacker sends the crafted URL request to the vulnerable IIS server.
Step 4: Source Code Disclosure: The IIS server, due to the vulnerability, fails to interpret the ASP file and instead returns the raw source code of the ASP file to the attacker.