Compromised IIS machine keys can lead to permanent access to IIS hosts via view state exploitation. In this post, we'll learn how to exploit view state via compromised IIS machine keys, how to detect a compromise and how to remediate a compromised host.