Is it possible to exploit some application on Ubuntu Karmic and get a shell? It is using 2.6.31-14 kernel, and has ASLR and NX protection. I know that it is possible to bypass those protections when they are only protection used on system. I saw some tutorials, and they bypassed ASLR and they used shellcode, but in NX they used "return to libc" which uses a system call. Is it possible to make exploit working with both protections on system?