You are correct, but these are for exploitive motives, an example would be reversing some kind of security measure to gain access to a database, or exploiting software to release it in its original form.
However, reversing software or any other kind of material in order to gain knowledge to...