-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathindex.html
More file actions
153 lines (148 loc) · 9.38 KB
/
index.html
File metadata and controls
153 lines (148 loc) · 9.38 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0, minimum-scale=1.0, user-scalable=0">
<meta name="format-detection" content="telephone=no">
<title>IotSploit DEV</title>
<link rel="stylesheet" href="./static/dist/style-libs-min.css">
<link rel="stylesheet" href="./static/dist/styles.css">
</head>
<body>
<header>
<section class="menu-section">
<a class="logo" href="/">
<svg xmlns="http://www.w3.org/2000/svg" width="410" height="43" viewBox="0 0 410 42.94"><defs><style>.cls-1{fill:#1a1a1a;}.cls-2{fill:red;}</style></defs><title>logo</title>
<path class="cls-1" d="M280.31,13.39h4.19v23h-4.19Z"/><path class="cls-1" d="M298,19.5c5.07,0,9.12,3.61,9.12,8.66s-4.06,8.66-9.08,8.66S289,33.26,289,28.16,293,19.5,298,19.5Zm0,13.83A4.93,4.93,0,0,0,303,28.42q0-.12,0-.25a4.93,4.93,0,1,0-9.84,0,4.9,4.9,0,0,0,4.64,5.14H298Z"/><path class="cls-1" d="M313.83,17h-7.56V13.41h19.28V17H318V36.44h-4.15Z"/><path class="cls-1" d="M326.37,31.67a7.23,7.23,0,0,0,4.71,1.82c1.46,0,2.3-.62,2.3-1.65,0-2.59-8.21-1.94-8.21-7.37,0-3.25,2.85-5,6.33-5a8.49,8.49,0,0,1,5.58,1.88l-1.52,2.88a7,7,0,0,0-4.19-1.43c-1.43,0-2.3.55-2.3,1.59,0,2.62,8.21,1.88,8.21,7.3,0,2.92-2.46,5.1-6.26,5.1a9.46,9.46,0,0,1-6.49-2.43Z"/>
<path class="cls-1" d="M341.25,19.88H345v1.24A11.29,11.29,0,0,1,345,22.3H345a6.07,6.07,0,0,1,5.25-2.79c4.48,0,7.33,3.54,7.33,8.66s-3.22,8.66-7.56,8.66a6,6,0,0,1-4.78-2.33h0a9.6,9.6,0,0,1,.1,1.43v7h-4.11Zm8.11,13.47c2.27,0,4.16-1.85,4.16-5.13s-1.73-5.2-4.13-5.2c-2.17,0-4.19,1.56-4.19,5.23,0,2.57,1.42,5.1,4.12,5.1Z"/><path class="cls-1" d="M361.59,13.39h4.09V30.66c0,1.81.62,2.27,1.69,2.27a4.4,4.4,0,0,0,.62,0v3.61a10.64,10.64,0,0,1-1.3.1c-2.27,0-5.1-.58-5.1-5.32Z"/><path class="cls-1" d="M379.17,19.5c5.07,0,9.12,3.61,9.12,8.66s-4.06,8.66-9.08,8.66-9.08-3.57-9.08-8.66S374.17,19.5,379.17,19.5Zm0,13.83a4.93,4.93,0,0,0,4.94-4.91q0-.12,0-.25a4.93,4.93,0,1,0-9.84,0,4.9,4.9,0,0,0,4.64,5.14h.26Z"/><path class="cls-1" d="M392.18,19.88h4.16V36.44h-4.13Z"/><path class="cls-1" d="M401.87,23.39h-2.14V20.11H402V15.37h4v4.74h3.77v3.28H406v6.46A2.94,2.94,0,0,0,409.25,33a3.31,3.31,0,0,0,.75-.06v3.61a10.58,10.58,0,0,1-1.26.1c-2.3,0-6.88-.68-6.88-6.23Z"/><circle class="cls-2" cx="394.23" cy="15.09" r="1.93"/><path class="cls-2" d="M282.4,6.74a1.93,1.93,0,0,0-1.87,1.45H276.3l-2.41-2.42H0v1H273.47l2.42,2.42h4.63a1.93,1.93,0,1,0,1.87-2.42Z"/><path class="cls-2" d="M274,11.56a1.92,1.92,0,0,0-1.16.4L271,10.11H0v1H270.57l1.64,1.64A1.93,1.93,0,1,0,274,11.59Z"/><path class="cls-2" d="M278,3.87a1.93,1.93,0,1,0-1.83-2.42H0v1H276.15A1.93,1.93,0,0,0,278,3.87Z"/>
</svg>
</a>
<div class="menu">
<ul>
<li><a href="#why">Why</a></li>
<li><a href="#services">Services</a></li>
<li><a href="#how">How to get started</a></li>
<li><a href="/dahua-template.html">Dahua vulnerability</a></li>
<li><a href="/blog-template.html">Blog</a></li>
</ul>
</div>
<button class="mobile-menu" onclick="$('.menu').slideToggle('slow')">
<img src="./static/img/icons/icon-menu.svg" alt="">
</button>
</section>
</header>
<main>
<section class="main--bg">
<div class="title">
Keeping your <i>IOT</i> perimeter <i>secure</i>
</div>
<div class="description">
<p>IOT technology is here to empower your life and your business. Instead it is becoming the Wild Wild West playground for cyber criminals before the technology has a chance of being widely adopted.</p>
<p class="information">We manage this risk by detecting and eliminating network vulnerabilities.</p>
</div>
</section>
<section id="why" class="info--why">
<div class="title">Why?</div>
<div class="description">Here are 4 reasons not to delay securing your IOT network:</div>
<div class="why-content">
<div class="why-item" id="why-item--1">
<i>1.</i> Security is the #1 problem according to Gartner, a leading authority on IT research & and other leading consultants such as Deloitte
</div>
<div class="why-item" id="why-item--2">
<i>2.</i> If your network is compromised, chances are the intruder will have access to more than one source of sensitive data e.g. financial info, email, CCTV cameras, lifestyle habits etc
</div>
<div class="why-item" id="why-item--3">
<i>3.</i> IOT economics is based on cheap sensors at the expense of security putting customers/enterprises at risk. Cyber criminals increasingly and regularly help themselves to unsecured but multiplying private and enterprise IOT networks to steal private/financial data and gain control of enterprises.
</div>
<div class="why-item" id="why-item--4">
<i>4.</i> If your network is compromised, chances are the intruder will have access to more than one source of sensitive data e.g. financial info, email, CCTV cameras, lifestyle habits etc
</div>
</div>
</section>
<section id="services" class=info--services>
<div class="service-content">
<div class="service-information">
<div class="title">Services</div>
<div class="description">
<p>IOTsploit automates scanning for network vulnerabilities and protects the IOT perimeter against weak passwords, obsolete/vulnerable software, known external threats.</p>
<p>This is done by detecting open ports, assessing the software, password matching using advanced databases and software and searching for vulnerabilities using the largest open sources vulnerability databases.</p>
<p>We generate personalised reports with recommendations based on individual findings. We don’t stop here. We take on the behavioural inertia by the horns by following up to check on two things: the implementation of security recommendations and level of security robustness of new adopted changes.</p>
</div>
</div>
</div>
</section>
<section id="how" class="info--form">
<div class="title">How to get started</div>
<div class="description">
Sign now for one time <strong>FREE</strong> external IP diagnostics:
this will check open ports… generate report…
</div>
<form action="/">
<input type="text" placeholder="Name" required>
<input type="text" placeholder="Company name" required>
<input type="text" placeholder="Role" required>
<input type="email" placeholder="Email" required>
<select name="select" id="select" data-placeholder="Number of IoTs" required>
<option value=""></option>
<option value="1">0 - 20</option>
<option value="2">20 - 50</option>
<option value="3">50 - 100</option>
<option value="4">100 - 500</option>
<option value="5"> > 500</option>
</select>
<button type="submit">
Register and get free audit
</button>
</form>
</section>
</main>
<footer id="contacts">
<div class="footer-content">
<div class="footer-menu">
<ul>
<li><a href="#why">Why</a></li>
<li><a href="#services">Services</a></li>
<li><a href="#how">How to get started</a></li>
<li><a href="/dahua-template.html">Dahua vulnerability</a></li>
<li><a href="/blog-template.html">Blog</a></li>
</ul>
</div>
<div class="contacts">
<a class="mail" href="#">hello@iotsploit.ai</a>
<div class="address">
350 Fifth Avenue, 34th floor
New York, NY 10118-3299 USA
</div>
<a class="phone" href="#">+996(550)500-000</a>
</div>
<div class="footer-social">
<!--<a class="social--icon fb" href="#">-->
<!--<img src="./static/img/icons/icon-facebook.svg" alt="">-->
<!--</a>-->
<a class="social--icon tw" href="http://twitter.com/iotsploit" target="_blank" rel="nofollow">
<img src="./static/img/icons/icon-twitter.svg" alt="">
</a>
<a class="social--icon git" href="http://github.com/iotsploit" target="_blank" rel="nofollow">
<img src="./static/img/icons/icon-github.svg" alt="">
</a>
<!--<a class="social--icon medium" href="#">-->
<!--<img src="./static/img/icons/icon-medium.svg" alt="">-->
<!--</a>-->
</div>
</div>
<div class="footer-copyright">
© 2017 Iotsploit
</div>
</footer>
<script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','https://www.google-analytics.com/analytics.js','ga');
ga('create', 'UA-83208754-4', 'auto');
ga('send', 'pageview');
</script>
<script src="./static/dist/libraries-min.js"></script>
<script src="./static/dist/scripts-min.js"></script>
</body>
</html>