1 00:00:00,690 --> 00:00:07,500 The next scale is reverse engineering, it is a process of recovering the design requirements, specifications 2 00:00:07,500 --> 00:00:14,670 and function of a product from an analysis of its code, it builds a program database and generates 3 00:00:14,670 --> 00:00:16,070 information from this. 4 00:00:16,920 --> 00:00:24,090 The objective of reverse engineering is to expand it the maintenance work by improving on understandability 5 00:00:24,090 --> 00:00:30,330 of produce the necessary document for a legacy system in software security. 6 00:00:30,330 --> 00:00:36,120 Reverse engineering is widely used to ensure that this system does not have any major security flaws 7 00:00:36,210 --> 00:00:37,380 or vulnerabilities. 8 00:00:38,040 --> 00:00:43,410 It helps to make our system strong, thereby protecting it from hackers and spyware. 9 00:00:44,190 --> 00:00:46,760 I know it is difficult to understand. 10 00:00:47,250 --> 00:00:49,230 Let me explain in simple words. 11 00:00:50,190 --> 00:00:53,640 Reverse engineering is also called as make engineering. 12 00:00:54,000 --> 00:01:00,810 It is the process of extracting knowledge or design information from anything manmade and reproducing 13 00:01:00,810 --> 00:01:04,830 it or reproducing anything based on the extracted information. 14 00:01:05,430 --> 00:01:12,000 Reverse engineering is also beneficial in crime, where suspected malware is reverse engineered to understand 15 00:01:12,000 --> 00:01:18,630 what each does and how to detect and remove it, and to allow computers and devices to work together. 16 00:01:19,290 --> 00:01:27,120 Reverse and reverse engineering can also be used to create software and media to remove their copy protection. 17 00:01:27,570 --> 00:01:33,000 So in conclusion, reverse engineering is also an important skill for ethical hacking.