Analysis Of Reverse Engineering And Cyber Assaults