In this chapter, we introduced the first truly reliable method of exploiting Solaris vulnerabilities, via single stepping the dynamic linker. Additionally, we looked into creating blowfish -encrypted shellcode that will allow us to circumvent any sort of network IDS or IPS.