<?xml version="1.0" encoding="ISO-8859-1" standalone="no"?> <html xmlns="http://www.w3.org/1999/xhtml"><head><title>egg</title><link rel="stylesheet" href="../../jargon.css" type="text/css"/><meta name="generator" content="DocBook XSL Stylesheets V1.61.0"/><link rel="home" href="../index.html" title="The Jargon File"/><link rel="up" href="../E.html" title="E"/><link rel="previous" href="ed.html" title="ed"/><link rel="next" href="egosurf.html" title="egosurf"/></head><body><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">egg</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="ed.html">Prev</a> </td><th width="60%" align="center">E</th><td width="20%" align="right"> <a accesskey="n" href="egosurf.html">Next</a></td></tr></table><hr/></div><dt><a id="egg"/><dt xmlns="" id="egg"><b>egg</b>: <span xmlns="http://www.w3.org/1999/xhtml" class="grammar">n.</span></dt></dt><dd><p>The binary code that is the payload for buffer overflow and format string attacks. Typically, an egg written in assembly and designed to enable remote access or escalate privileges from an ordinary user account to administrator level when it hatches. Also known as <span class="firstterm">shellcode</span>. </p><p>The name comes from a particular buffer-overflow exploit that was co-written by a cracker named eggplant. The variable name ‘egg’ was used to store the payload. The usage spread from people who saw and analyzed the code. </p></dd><div class="navfooter"><hr/><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="ed.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="../E.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="egosurf.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">ed </td><td width="20%" align="center"><a accesskey="h" href="../index.html">Home</a></td><td width="40%" align="right" valign="top"> egosurf</td></tr></table></div></body></html>