Brothersoft.com Windows | Games | Mobile | Wallpapers

Advertisement

Guarded Memory Move

The Guarded Memory Move tool gets handy when you have to study buffer overflows.

Advertisement

Last Week downloads: 0
Total downloads: 61
  • Last Updated: Aug 19, 2010
  • License: GPL Free
  • OS: Linux/BSD
  • Requirements: No special requirements
screenshot

User reviews

4 out of 5 based on 1 ratings for Guarded Memory Move

For Guarded Memory Move Publisher's description

Advertisement

Guarded Memory Move is a Scripts software developed by Davide Libenzi. After our trial and test, the software is proved to be official, secure and free. Here is the official description for Guarded Memory Move:

Edit By BS Editor: The Guarded Memory Move tool gets handy when you have to study buffer overflows and you need to catch them together with a "good" stack image. When a stack overflow has been exploited, the back trace is already gone together with good information about parameters and local variables, that are of vital importance when trying to understand how the attacker is trying to work out the exploit. The GMM Library uses dynamic function call interception to catch the most common functions that are used by attackers to exploit stack buffers. The GMM library uses the LD_PRELOAD capability and offers two services to the user. First of all, it avoids buffer overflow to allow the attacker to execute shell-code on your machine. Second, in case where an exploit is detected, the stack content is saved and a segmentation fault is triggered. The resulting core dump will then have all the necessary information to debug the exploit and fix the software. Internally, the library insert itself between the application and the glibc library and intercept functions that might lead to buffer overflow exploits. Before calling the glibc core function, the GMM Layer saves part of the stack Frame above the caller to a temporary location in its frame. It also stores the previous three return addresses in its local storage before calling the glibc core function. When the core function returns, the GMM code samples again the previously recorded return addresses and, if they differ, it restores the previously saved stack frame and issue a segmentation fault. This with a clean stack frame, so that it can be inspected with a debugger. While other solutions exist to Detect buffer overflow exploits, like for example StackGuard and StackShield, those differs from GMM in many ways. They live as gcc patches and do require you to rebuild your application to use their functionalities. The good of this approach is that every single function is protected against buffer overflows.
you can free download Guarded Memory Move now.

For Guarded Memory Move Related Software

Statement

Please be aware that Brothersoft do not supply any crack, patches, serial numbers or keygen for Guarded Memory Move,and please consult directly with program authors for any problem with Guarded Memory Move.