Page cover

What did we learn?

To summarize this portion of the examples, we learned how to properly identify specific functions and routines whilst also being able to verify and reverse engineer modified or compiler-tuned functions such as free which can be direct pinpoints to vulnerabilities in the program. This should help you grasp a lot of knowledge for the binary auditing portion of this playground in Binary Auditing - 6.4.0

Last updated