I don't know if it the right place where to ask an help.
Anyway, I'm writing an exploit for the new proftpd stack overflow vulnerability.
Infact, I already analyzed the stack and created the exploit... the problem is that it works only if I install proftpd in the debug mode.
I know there is a way with GDB to attach the pid of the process running in a normal way ( for "normai", I mean withou debug options ) in order to keep a neat stack on which I can work...
In other words, if u want to develope an exploit for a vulnerable linux service with root privilages... what would u do?
Thanks in advance... I hope my italienglish is enought easy to understand!!