Exploiting SEH-based buffer overflows with Metasploit