To summarize this portion of the examples, we learned how to properly identify specific functions and routines whilst also being able to verify and reverse engineer modified or compiler-tuned functions such as free which can be direct pinpoints to vulnerabilities in the program. This should help you grasp a lot of knowledge for the binary auditing portion of this playground in Binary Auditing - 6.4.0