1 00:00:05,830 --> 00:00:11,980 Breaking something down and putting it back together, this is a process that helps people understand 2 00:00:11,980 --> 00:00:12,990 how things were made. 3 00:00:13,600 --> 00:00:21,400 A person will be able to redo and reproduce an origami by folding the first, knowing how cardboard 4 00:00:21,520 --> 00:00:26,820 requires understanding each major and minor mechanical parts and their purposes. 5 00:00:27,930 --> 00:00:35,460 The complex nature of human anatomy requires people to understand each and every part of the body, 6 00:00:36,060 --> 00:00:36,720 but how? 7 00:00:37,140 --> 00:00:43,750 By dissecting it, reverse engineering is a way for us to understand how things were designed. 8 00:00:44,160 --> 00:00:53,160 Why is it instead in its state when it triggers how it works and what its purpose is? 9 00:00:54,420 --> 00:01:00,000 In effect, the information is used to redesign and improve for better performance and cost. 10 00:01:00,930 --> 00:01:03,340 It can anyone help fix the face? 11 00:01:04,230 --> 00:01:11,700 Imagine if the Trojan horse was thoroughly inspected and torn down before it was allowed to enter the 12 00:01:11,700 --> 00:01:12,630 gates of the city. 13 00:01:13,590 --> 00:01:20,420 This will probably cause a few dead soldiers outside the gate fighting for the city the next time it 14 00:01:20,420 --> 00:01:20,880 is sent. 15 00:01:20,880 --> 00:01:27,360 Another Trojan horse, ashfall, to know where the point they are heroes and not that soldiers this 16 00:01:27,360 --> 00:01:27,710 time. 17 00:01:28,500 --> 00:01:32,120 The same is true for Mulwaree answers. 18 00:01:32,460 --> 00:01:38,310 By knowing the behaviors of a certain mullah to the reverse engineering, the analyst can recommend 19 00:01:38,310 --> 00:01:40,140 various safeguards for the network. 20 00:01:41,040 --> 00:01:50,080 Think of it as the Trojan horse being the malware and the analyst being the solar is initially inspected. 21 00:01:50,100 --> 00:01:53,790 The horse and the city being the network of computers. 22 00:01:56,560 --> 00:02:04,600 Anyone seeking to become a reverse engineer or at least should have to have the threat of being resourceful, 23 00:02:04,960 --> 00:02:12,250 searching the Internet is a part of reverse engineering and no, they will not play, only rely on the 24 00:02:12,250 --> 00:02:15,850 tools and the information they provide in these new Democrats. 25 00:02:16,480 --> 00:02:25,060 There are instances that an analysis analyst of old age will require a reverse engineer to develop their 26 00:02:25,090 --> 00:02:35,700 own tools, software, outfitting my requirements, engineering, besides high level court review processes 27 00:02:35,710 --> 00:02:40,080 and software quality verification also involves implementing reverse engineering. 28 00:02:40,780 --> 00:02:47,030 The aim of these test activities is to ensure that the vulnerabilities are found and fixed. 29 00:02:47,560 --> 00:02:53,950 There are a lot of factors that are not taken into consideration during the design and development of 30 00:02:53,950 --> 00:02:55,070 a piece of software. 31 00:02:55,690 --> 00:03:02,620 Most of these are random input and external factors that might cause leaks leading to vulnerabilities. 32 00:03:05,800 --> 00:03:12,640 These vulnerabilities may be used for malicious intent that not only throughout the software, but may 33 00:03:12,790 --> 00:03:18,310 cause damage and compromise the system environment it is installed in. 34 00:03:19,700 --> 00:03:26,660 System monitoring and fuzzing tools are commonly used when testing software to these operating systems 35 00:03:26,750 --> 00:03:34,280 have better safeguards to protect from crashing, operating systems usually report and a discrepancy 36 00:03:34,280 --> 00:03:37,910 is found, such as memory or file corruption. 37 00:03:38,790 --> 00:03:45,410 Additional information such as crash dams are also provided in this cause for this information, and 38 00:03:45,410 --> 00:03:52,340 reverse engineer will be able to pinpoint where exactly in the software they have to inspect. 39 00:03:55,320 --> 00:04:03,210 In the software security industry, one, of course, is required is reverse engineering, every attack 40 00:04:03,810 --> 00:04:09,000 in the form of a major form of malware is reversed and analyzed. 41 00:04:09,270 --> 00:04:15,870 The first thing that is usually needed is to clear the network and systems from being compromised and 42 00:04:15,870 --> 00:04:16,560 analyzed. 43 00:04:16,770 --> 00:04:21,960 It determines how the how the malware installed itself and became resistant. 44 00:04:22,560 --> 00:04:28,490 Then they developed steps for uninstalling the malware in the A.M. repair phase. 45 00:04:29,250 --> 00:04:36,060 These steps are used to develop the clean up routine once the anti malware product is able to detect 46 00:04:36,630 --> 00:04:38,420 that the system has been compromised. 47 00:04:40,290 --> 00:04:47,430 The analysis provides information about how the malware was able to compromise the system with this 48 00:04:47,430 --> 00:04:55,260 information, network administrators are able to impose policies to mitigate the attack. 49 00:04:55,770 --> 00:05:03,030 If the mother was able to enter the system because of user opening and email attachment that contains 50 00:05:03,030 --> 00:05:09,690 JavaScript code, the network administrator will implement the blocking of emails that contain JavaScript 51 00:05:09,690 --> 00:05:10,430 attachment. 52 00:05:11,490 --> 00:05:17,690 Some administrators are advised to structure the network infrastructure. 53 00:05:19,000 --> 00:05:24,340 Once a system gets compromised, the attackers may already have got all of the information about the 54 00:05:24,340 --> 00:05:31,720 network and would easily be able to make another video of a same attack, making and making major changes 55 00:05:31,930 --> 00:05:35,690 will greatly help prevent the same attack from happening again. 56 00:05:36,370 --> 00:05:40,270 Part of structuring infrastructure is the creation. 57 00:05:40,540 --> 00:05:47,320 The best way to prevent the system from being compromised is by educating its users about securing information, 58 00:05:47,710 --> 00:05:54,550 including their privacy, knowing about social engineering and having the experience of previous attacks 59 00:05:54,760 --> 00:05:56,810 make users aware of security. 60 00:05:57,460 --> 00:06:04,100 It's important to know how attackers are able to compromise and institution and what damage they can 61 00:06:04,240 --> 00:06:04,810 count. 62 00:06:05,470 --> 00:06:12,100 As a result, security policies are imposed, backups are setup and continuous learning is implemented 63 00:06:12,550 --> 00:06:13,420 going further. 64 00:06:14,980 --> 00:06:22,270 Target companies can report the attack to authorities, even a small piece of information can give authorities 65 00:06:22,660 --> 00:06:28,360 hints to help them hunt down the suspects and shut down Mulwaree Communications servers. 66 00:06:30,010 --> 00:06:36,610 System cam systems can be compromised by taking advantage of software vulnerabilities after the attacker 67 00:06:36,610 --> 00:06:43,330 gets no knowledge about the target, the attacker can craft code that exploits known software on the 68 00:06:43,340 --> 00:06:43,860 narrative. 69 00:06:44,560 --> 00:06:48,820 Besides making change in the interest structure. 70 00:06:49,030 --> 00:06:56,770 And so then you should also keep up to date with the security features and updates and patches. 71 00:06:57,250 --> 00:07:00,820 Reverse engineering is also needed to find the most vulnerable code. 72 00:07:01,690 --> 00:07:07,000 This helps pinpoint the vulnerable code by back tracking it to the source. 73 00:07:07,900 --> 00:07:11,710 All of these activities are done based on the output of reverse engineering. 74 00:07:11,950 --> 00:07:17,710 The information gathered from reverse engineering affects how the information infrastructure needs to 75 00:07:17,710 --> 00:07:18,520 be structured.