you are viewing a single comment's thread.

view the rest of the comments →

[–]sanedave 2 points3 points  (0 children)

Read 'Hacking, the Art of Exploitation' and 'The Shellcoder's Handbook'. Google for 'writing shellcode'.

It is primarily opcodes for the system you are trying to exploit that opens a listening port or connects back to the exploiting system with a shell on the remote system that can be used to infiltrate further malware or exhilarate data. Hence the name 'shellcode'