|
1 |
| -import React from 'react' |
2 |
| -import Speaker from './Speaker.jsx' |
3 |
| -import AnimatedText from './text.jsx' |
| 1 | +import React from "react"; |
| 2 | +import Speaker from "./Speaker.jsx"; |
| 3 | +import AnimatedText from "./text.jsx"; |
4 | 4 |
|
5 | 5 | function Speakers() {
|
| 6 | + const speakersData = [ |
| 7 | + { |
| 8 | + name: "Yeyati Prasher", |
| 9 | + image: "/cool-peeps/yeyati.jpg", |
| 10 | + subname: "Linux Basics", |
| 11 | + values: { |
| 12 | + "Introduction to Linux": "Understanding the basics", |
| 13 | + "Command Line Tools": "Essential CLI utilities", |
| 14 | + "File System": "Navigating and managing files", |
| 15 | + "Networking": "Linux network fundamentals", |
| 16 | + }, |
| 17 | + }, |
| 18 | + { |
| 19 | + name: "Sid Karnam", |
| 20 | + image: "/cool-peeps/sid.jpg", |
| 21 | + subname: "Binary Exploitation", |
| 22 | + values: { |
| 23 | + "OSINT Basics": "What is Open Source Intelligence?", |
| 24 | + "Finding Information": "Techniques and tools", |
| 25 | + "Data Analysis": "Extracting insights", |
| 26 | + "Social Engineering": "How OSINT aids in cybersecurity", |
| 27 | + }, |
| 28 | + }, |
| 29 | + { |
| 30 | + name: "Goutham Rajeev", |
| 31 | + image: "/cool-peeps/goutham.jpg", |
| 32 | + subname: "Web Security", |
| 33 | + values: { |
| 34 | + "Web Vulnerabilities": "XSS, CSRF, SQL Injection", |
| 35 | + "Penetration Testing": "Tools and techniques", |
| 36 | + "Exploiting Web Apps": "Fixing security loopholes", |
| 37 | + }, |
| 38 | + }, |
| 39 | + { |
| 40 | + name: "Preetham Pemmasani", |
| 41 | + image: "/cool-peeps/preetham.jpg", |
| 42 | + subname: "OSINT", |
| 43 | + values: { |
| 44 | + "OSINT Basics": "What is Open Source Intelligence?", |
| 45 | + "Finding Information": "Techniques and tools", |
| 46 | + "Data Analysis": "Extracting insights", |
| 47 | + "Social Engineering": "How OSINT aids in cybersecurity", |
| 48 | + }, |
| 49 | + }, |
| 50 | + ]; |
| 51 | + |
6 | 52 | return (
|
7 |
| - <> |
8 |
| - <div className="z-20 px-10 text-left"> |
9 |
| - <AnimatedText |
10 |
| - text="SPEAKERS" |
11 |
| - className="lg:9xl z-50 w-screen cursor-pointer text-left font-neuebit text-6xl uppercase md:text-8xl" |
12 |
| - customText="_-" |
13 |
| - time={2} |
14 |
| - preStyle="font-neuebit uppercase text-6xl md:text-8xl lg:9xl text-yellow-500 z-50 cursor-pointer text-left" |
15 |
| - /> |
| 53 | + <div className="px-6 lg:px-20 py-10 text-left bg-black text-yellow-500 border border-green-500 shadow-lg rounded-lg"> |
| 54 | + <AnimatedText |
| 55 | + text="SPEAKERS" |
| 56 | + className="w-full font-mono text-5xl md:text-7xl lg:text-9xl uppercase text-yellow-500 transition-all duration-300 hover:text-yellow-500" |
| 57 | + customText="_-" |
| 58 | + time={2} |
| 59 | + /> |
| 60 | + |
| 61 | + <div className="mt-10 space-y-16 flex flex-col items-center"> |
| 62 | + {speakersData.map((speaker, index) => ( |
| 63 | + <Speaker key={index} index={index + 1} {...speaker} /> |
| 64 | + ))} |
16 | 65 | </div>
|
17 |
| - <Speaker |
18 |
| - name="Yeyati Prasher" |
19 |
| - subname="Linux Basics" |
20 |
| - image="/cool-peeps/yeyati.jpg" |
21 |
| - values={{ |
22 |
| - 'Command Line Interface': |
23 |
| - 'Master navigation, file manipulation, and shell fundamentals.', |
24 |
| - 'Bash Scripting': 'Automate tasks using Bash commands and scripts.', |
25 |
| - 'File System Hierarchy': 'Understand Linux directory structure.', |
26 |
| - 'User & Group Management': 'Handle users and permissions.', |
27 |
| - 'File Permissions': 'Control access with chmod and chown.' |
28 |
| - }} |
29 |
| - ></Speaker> |
30 |
| - <Speaker |
31 |
| - ct="👶" |
32 |
| - name="Sid Karnam" |
33 |
| - image="/cool-peeps/sid.jpg" |
34 |
| - subname="Binary Exploitation" |
35 |
| - values={{ |
36 |
| - 'Basics of Binary Exploitation': |
37 |
| - 'Understanding and exploiting binary vulnerabilities', |
38 |
| - 'Basic Tools for Analysis': |
39 |
| - 'Using gdb, checksec, readelf, and ROPgadget', |
40 |
| - 'Analyzing a Binary': 'Extracting insights using security tools', |
41 |
| - Overflows: 'Exploiting buffer, integer, and stack overflows', |
42 |
| - 'Formatting Vulnerabilities': |
43 |
| - 'Attacking printf-style format string bugs', |
44 |
| - 'ROP & GOT Basics': 'Bypassing protections using ROP and GOT' |
45 |
| - }} |
46 |
| - ></Speaker> |
47 |
| - <Speaker |
48 |
| - ct="🦜" |
49 |
| - name="Goutham Rajeev" |
50 |
| - subname="Web" |
51 |
| - image="/cool-peeps/goutham.jpg" |
52 |
| - values={{ |
53 |
| - 'SQL Injection using OR/And Clause': |
54 |
| - 'Bypass auth using OR/AND logic.', |
55 |
| - 'Exploiting Where conditions': 'Manipulate WHERE to leak data.', |
56 |
| - 'Union attacks': 'Merge queries using UNION.', |
57 |
| - 'XSS Reflected attack': 'Immediate script reflection.', |
58 |
| - 'XSS Stored attack': 'Stored scripts compromise users.', |
59 |
| - 'XSS DOM attack': 'Inject scripts via DOM.', |
60 |
| - 'File Upload Vulnerabilities': 'Weak upload checks risk systems.', |
61 |
| - 'Uploading web shells': 'Hide scripts as files.', |
62 |
| - 'Bypassing file restrictions': 'Circumvent file validations.', |
63 |
| - 'Path traversal via File Upload': 'Exploit directory traversal.' |
64 |
| - }} |
65 |
| - customaudio="/sfx/parrots.wav" |
66 |
| - ></Speaker> |
67 |
| - <Speaker |
68 |
| - ct="🧏🤫" |
69 |
| - name="Preetham Pemmasani" |
70 |
| - image="/cool-peeps/preetham.jpg" |
71 |
| - subname="OSINT" |
72 |
| - values={{ |
73 |
| - topic1: 'description1', |
74 |
| - topic2: 'description2', |
75 |
| - topic3: 'description3', |
76 |
| - topic4: 'description4', |
77 |
| - topic5: 'description5', |
78 |
| - topic6: 'description6', |
79 |
| - topic7: 'description7', |
80 |
| - topic8: 'description8' |
81 |
| - }} |
82 |
| - ></Speaker> |
83 |
| - </> |
84 |
| - ) |
| 66 | + </div> |
| 67 | + ); |
85 | 68 | }
|
86 | 69 |
|
87 |
| -export default Speakers |
| 70 | +export default Speakers; |
0 commit comments