Exploiting a stack overflow vulnerability with Metasploit