1 00:00:00,180 --> 00:00:06,480 Now, in this video, we are going to learn about what is real evidence and tool, so this tool will 2 00:00:06,480 --> 00:00:09,960 be very helpful in creating fields. 3 00:00:10,590 --> 00:00:17,310 So Village Vision is a tool used to generate payloads that bypass traditional anti US products during 4 00:00:17,310 --> 00:00:21,150 offensive security engagements is stimulating a genius attack. 5 00:00:21,300 --> 00:00:27,330 If a malicious attacker manages to compromise the villages and instances, they could potentially gain 6 00:00:27,330 --> 00:00:33,540 access to client networks being exposed and destroyed by the offensive security professional with disastrous 7 00:00:33,540 --> 00:00:33,900 results. 8 00:00:34,500 --> 00:00:39,240 So now let's understand what his value is and how does it work so well. 9 00:00:39,240 --> 00:00:46,020 Evasion is a tool designed for penetration testers and victims or to the hackers to stimulate bypasses 10 00:00:46,020 --> 00:00:47,760 of common antivirus products. 11 00:00:48,330 --> 00:00:51,310 Tools like these are of very high value. 12 00:00:51,600 --> 00:00:58,410 And so security professionals as they can be used to emulate a more persistence attacker who will try 13 00:00:58,410 --> 00:01:06,300 to bypass a system through trial and error without tools such as well, a vision of security engagement's 14 00:01:06,810 --> 00:01:13,740 would take longer and cost a good deal more Willoughby's and can work on existing executables or simply 15 00:01:13,740 --> 00:01:15,660 create a wide range of issues. 16 00:01:15,900 --> 00:01:23,790 With Salkeld added to them the majority of cases users could be smattered as the resulting payload has 17 00:01:23,790 --> 00:01:26,160 a better chance of evading into systems. 18 00:01:27,040 --> 00:01:33,700 Considering that a tool like this is used by professionals organization to stimulate an attack by adversaries, 19 00:01:33,910 --> 00:01:40,360 it would make sense to allow a user to commit the generation of a payload from a central location. 20 00:01:41,300 --> 00:01:48,410 This allows it to be integrated into attack workflows, which alerts offensive security professionals 21 00:01:48,800 --> 00:01:50,300 who work more efficiently. 22 00:01:50,570 --> 00:01:58,490 One feature made available by television is a remote processor called which is also called IPSC for 23 00:01:58,490 --> 00:02:01,910 automating the generation of those creating the malware. 24 00:02:01,910 --> 00:02:08,870 Using this RBC, though it is not accessed during the actual use of the malware and the malware itself 25 00:02:08,870 --> 00:02:11,520 does not connect with our PC. 26 00:02:11,750 --> 00:02:14,420 So this is the brief introduction about the railways. 27 00:02:14,790 --> 00:02:20,180 In the next video, we are going to see how to install Willoughby's into Unix operating system.