Here is an article explaining how shellcodes work: “This article is not a guide on writing exploits, nor an overview of popular vulnerabilities. This is a step-by-step guide on developing a shellcode, a crucial point of any exploit software. Hopefully, learning how they work will help conscientious and respectable developers and system administrators to understand how malefactors think and to defend their systems against them.”
How Shellcodes Work
Submitted by Mediv 2006-05-19 Privacy, Security 4 Comments
I only skimmed through this article, but from what I saw I think I still like Aleph One’s old classic article more.