<table cellspacing="0" cellpadding="0" border="0" ><tr><td valign="top" style="font: inherit;">you don't have to do any RE yourself, since there are "Binary Analysis Tools" which takes executable and creates a run-time environment then loads each segment and checks for security vulnerabilities/issues.<br><br><font style="font-family: bookman old style,new york,times,serif;" size="2">--Srikar<br><span style="font-weight: bold;">0917-66-176-99</span></font><br><br>--- On <b>Thu, 1/7/10, Soi, Dhruv <i>&lt;dhruv.soi@owasp.org&gt;</i></b> wrote:<br><blockquote style="border-left: 2px solid rgb(16, 16, 255); margin-left: 5px; padding-left: 5px;"><br>From: Soi, Dhruv &lt;dhruv.soi@owasp.org&gt;<br>Subject: Re: [Owasp-delhi] Reverse Engineering<br>To: "'chintan dave'" &lt;davechintan@gmail.com&gt;, owasp-mumbai@lists.owasp.org<br>Cc: owasp-delhi@lists.owasp.org, owasp-bangalore@lists.owasp.org<br>Date: Thursday, 1 July, 2010, 12:44 AM<br><br><div
 class="plainMail">I think its there in the EULA shipped with any software.<br><br>-----Original Message-----<br>From: <a ymailto="mailto:owasp-delhi-bounces@lists.owasp.org" href="/mc/compose?to=owasp-delhi-bounces@lists.owasp.org">owasp-delhi-bounces@lists.owasp.org</a><br>[mailto:<a ymailto="mailto:owasp-delhi-bounces@lists.owasp.org" href="/mc/compose?to=owasp-delhi-bounces@lists.owasp.org">owasp-delhi-bounces@lists.owasp.org</a>] On Behalf Of chintan dave<br>Sent: 30 June 2010 19:46<br>To: <a ymailto="mailto:owasp-mumbai@lists.owasp.org" href="/mc/compose?to=owasp-mumbai@lists.owasp.org">owasp-mumbai@lists.owasp.org</a><br>Cc: <a ymailto="mailto:owasp-delhi@lists.owasp.org" href="/mc/compose?to=owasp-delhi@lists.owasp.org">owasp-delhi@lists.owasp.org</a>; <a ymailto="mailto:owasp-bangalore@lists.owasp.org" href="/mc/compose?to=owasp-bangalore@lists.owasp.org">owasp-bangalore@lists.owasp.org</a><br>Subject: [Owasp-delhi] Reverse Engineering<br><br>Hi
 Experts,<br><br>I need a small help from you.<br><br>Is RE legal for security assessments of products purchased from vendors?<br><br>There has been a bit of confusion around RE topic.<br><br>I know it is illegal to do RE to steal the idea, however this one, I<br>need feedback from you folks.<br><br>If you can share some authoritative resources that could confirm on<br>the legality/illegality, it would be great.<br><br>-- <br>Regards,<br>Chintan Dave,<br><br>LinkedIn: <a href="http://in.linkedin.com/in/chintandave" target="_blank">http://in.linkedin.com/in/chintandave</a><br>Blog:<a href="http://www.chintandave.com" target="_blank">http://www.chintandave.com</a><br>_______________________________________________<br>Owasp-delhi mailing list<br><a ymailto="mailto:Owasp-delhi@lists.owasp.org" href="/mc/compose?to=Owasp-delhi@lists.owasp.org">Owasp-delhi@lists.owasp.org</a><br><a href="https://lists.owasp.org/mailman/listinfo/owasp-delhi"
 target="_blank">https://lists.owasp.org/mailman/listinfo/owasp-delhi</a><br><br>_______________________________________________<br>Owasp-delhi mailing list<br><a ymailto="mailto:Owasp-delhi@lists.owasp.org" href="/mc/compose?to=Owasp-delhi@lists.owasp.org">Owasp-delhi@lists.owasp.org</a><br><a href="https://lists.owasp.org/mailman/listinfo/owasp-delhi" target="_blank">https://lists.owasp.org/mailman/listinfo/owasp-delhi</a><br></div></blockquote></td></tr></table><br>