Summary

Today we introduce the buffer overflow vulnerability by using a known case in the SLMail5.5.0 application released in 2001. We discuss how an exploit is constructed and then use Python to create a script that will overflow the memory buffer. By the end of the experiment we demonstrate that we have full control of the EIP register and write a unique string to showcase how we can use the input from the POP3 login prompt to overwrite this register.

Click here for full report.