This article discusses the concept of shellcode, its development bottom-line, components of an exploitation attack, bypassing an intrusion detection system, program counter and its importance for an attacker, and advantages of using alphanumeric encoding engines for shellcodes. It also provides a shellcode to ask for username and user password twice and explains the commands used in the demo. The article concludes with a comparison of different types of shellcodes.