The attacker generates a shell code that will be executed when the EIP is overwritten. The shell code typically opens a backdoor on the victim's machine, giving the attacker remote access and control. If the shell code is successful, the attacker has gained "root" access to the system, which means they have full administrative privileges.