Reverse engineering is analyzing compiled software to understand its behavior. Binary exploitation finds vulnerabilities in programs at machine-code level.
Example:
A security analyst disassembles a malware binary to find how it spreads, then writes a signature for detection.
Exercise: Use a free disassembler tool (like Ghidra) to open a simple compiled program and inspect its functions.