This whitepaper goes into detail on exploitation techniques to bypass modern security mechanisms cerated to mitigate the common buffer overflow in Linux.
You can download it from the following link: https://packetstormsecurity.com/files/download/122853/smashstack2013.pdf
Source: https://packetstormsecurity.com/files/122853/Smashing-The-Stack-An-Example-From-2013.html

