diff --git a/src/app/page.tsx b/src/app/page.tsx index 40abbd7..eaf072f 100644 --- a/src/app/page.tsx +++ b/src/app/page.tsx @@ -44,12 +44,12 @@ export default function LandingPage() { title="Kali Linux: The Ultimate OS for Penetration Testing" description="Advanced penetration testing distribution for security researchers, analysts, and developers." carouselItems={[ - { id: "1", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" }, - { id: "2", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" }, - { id: "3", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" }, - { id: "4", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" }, - { id: "5", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" }, - { id: "6", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" }, + { id: "1", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=1" }, + { id: "2", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=2" }, + { id: "3", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=3" }, + { id: "4", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=4" }, + { id: "5", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=5" }, + { id: "6", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=6" }, ]} tag="Next-Gen Security" tagIcon={ShieldCheck} @@ -71,16 +71,16 @@ export default function LandingPage() { useInvertedBackground={true} features={[ { - id: 1, title: "Penetration Testing", description: "Comprehensive tools for exploitation and assessment.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png" }, - phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png" } + id: 1, title: "Penetration Testing", description: "Comprehensive tools for exploitation and assessment.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png?_wi=1" }, + phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png?_wi=2" } }, { - id: 2, title: "Vulnerability Analysis", description: "Deep scanning and identification of infrastructure gaps.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png" }, - phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png" } + id: 2, title: "Vulnerability Analysis", description: "Deep scanning and identification of infrastructure gaps.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png?_wi=1" }, + phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png?_wi=2" } }, { - id: 3, title: "Digital Forensics", description: "Analyze and recover critical digital evidence efficiently.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png" }, - phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png" } + id: 3, title: "Digital Forensics", description: "Analyze and recover critical digital evidence efficiently.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png?_wi=1" }, + phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png?_wi=2" } } ]} showStepNumbers={true}