Skip to content

Remote Shell-Code Execution using the SLMail-5.5.0 Service

Published: at 12:00 AM

Remote Shell-Code Execution

Summary

Today we extend the previous experiment with probing a buffer exploit vulnerability inside SLMail and getting the program to execute the remotely placed shell-code. We successfully get SLMail to open a TCP socket listening socket on port 4444 leading to a Administrative privileged command prompt. The shell-code is loading remotely using a Python script that creates the specially crafted payload that contains the shell-code inside.

Click here for full report.