View
45
Download
0
Category
Preview:
Citation preview
VO: Hackers are constantly trying to �nd and exploit security �aws to break into your website.
Scene 1 A map of the world with a web server icon in one location.
advids.co
Scene 1 Hacker icons pop up in di�erent parts of the world…dotted lines connect from the hacker iconsto the web server icons and malicious code icons �y towards the web server.
advids.co
VO: To beat hackers at their own game you need to �nd the vulnerabilities in your websites before hackers do.
Scene 2 Zoom into the web server and show a typical website mockup open up on a computer monitor.
advids.co
Scene 2 Mock-up reveals di�erent vulnerabilities with typos and alert icon
SQL Injection
XSS
CSRF
LFI
RCEadvids.co
Scene 3Zoom out and show the website as an icon beside icons of
web application and web services. Above them logo of Netsparker.
Web applications
HTML PHP
JS
CSS
WWW
VO: Scan your websites, web applications and web services with Netsparker.
Web services
advids.co
Scene 4 Typos below
VO: You do not need to have access to the source-code, install an agent or use specialized software.
Access source code Install an agent Use specialized software
Web applications
HTML PHP
JS
CSS
WWW
Web services
advids.co
Scene 5 The typos disappear. A probe appears from the logo and casts a scanning light the icons.
VO: Simply point the Netsparker web application security scanner to your website and it will automatically �nd the security holes.
Web applications
HTML PHP
JS
CSS
WWW
Web services
advids.co
Scene 5 . Small red exclamation marks pop up above the icon.
Web applications
HTML PHP
JS
CSS
WWW
Web services
advids.co
Scene 6 The exclamation mark over the web app icon moves to the center of the screen,as the rest of the visual goes out of focus in the background.
VO: Netsparker's deadly-accurate scanning technology can �nd vulnerabilities in any type of custom and modern web application,
Vulnerability
advids.co
Scene 8The visual is absorbed back into the Netsparker logo in the background as the rest of the screen
clears up and two icons appear alongside Netsparker logo showing thumbs-up signs
VO: E�ective use of Netsparker doesn't require you to be a seasoned security professional.
advids.co
Scene 9 Everything disappears except the logo. Below a warning or alert sign with typo “Vulnerability”.
VO: Not only is it easy to use, upon �nding a vulnerability, Netsparker automatically exploits it in a safe way and generates a proof of exploitation.
Vulnerability
advids.co
Scene 9The alert sign unfurls into a command prompt mockup with dummy text.
The typo “Vulnerability” morphs into “Proof of Exploit”. Scroll through the mockup slowly.
Proof of Exploit
Command Injections
Vulnerability Details
Identified Database Bersion
Identified Database Name
Identified Database User
CLASSIFIATION
CONFIRMED CRITICAL
microsoft sql server 2014 - 12.0.4100.1 (x64)
shoppingcart
dbo_admin
advids.co
Scene 10The typos disappear and the command prompt disappears. A software window opens up out of
the Netsparker logo below. Show vulnerability listed. The Con�rmed box gets highlighted.
VO: Because the vulnerability has been con�rmed, you don't need to manually check for a false positive.
Command Injections
Vulnerability Details
Identified Database Bersion
Identified Database Name
Identified Database User
CLASSIFIATION
CONFIRMED CRITICAL
microsoft sql server 2014 - 12.0.4100.1 (x64)
shoppingcart
dbo_admin
advids.co
Scene 10 Typo below the window
Automatic Vulnerability Verification
Command Injections
Vulnerability Details
Identified Database Bersion
Identified Database Name
Identified Database User
CLASSIFIATION
CONFIRMED CRITICAL
microsoft sql server 2014 - 12.0.4100.1 (x64)
shoppingcart
dbo_admin
advids.co
Scene 11 Icons of a clock with spinning hands and reducing money stack appears.
VO: This saves you time and money.
advids.co
Scene 12Only the clock remains on screen…
Below a computer screen facing the camera shows Netsparker logo actively scanning a website
VO: Finally, you’ll be able to leave the o�ce on time because Netsparker does all the hard work for you.
advids.co
Scene 13 Below two lines snake out like a hierarchy chart and two versions of the Netsparker tool pop up.
VO: Netsparker scanner is available as a desktop-based software and as a multi-user cloud based service,
Netsparker Desktop
advids.co
Scene 14 Customer logos pop up around the earlier visual
VO: which has already helped world renowned companies ensure the security of all their websites.
advids.co
Recommended