253 lines
8.1 KiB
JSON
253 lines
8.1 KiB
JSON
{
|
|
"main": {
|
|
"id": "b894e6395441bf91",
|
|
"type": "split",
|
|
"children": [
|
|
{
|
|
"id": "18e28060fe2de0a2",
|
|
"type": "tabs",
|
|
"children": [
|
|
{
|
|
"id": "d83bb0bbeeb86eec",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "markdown",
|
|
"state": {
|
|
"file": "Penetration Testing/Week 7/Lecture 7 - Vulnerability Scanning.md",
|
|
"mode": "source",
|
|
"source": false
|
|
},
|
|
"icon": "lucide-file",
|
|
"title": "Lecture 7 - Vulnerability Scanning"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"direction": "vertical"
|
|
},
|
|
"left": {
|
|
"id": "29180f976da6913e",
|
|
"type": "split",
|
|
"children": [
|
|
{
|
|
"id": "5e6a5a1cfc68c394",
|
|
"type": "tabs",
|
|
"children": [
|
|
{
|
|
"id": "b645eb003ca29da3",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "search",
|
|
"state": {
|
|
"query": "tag:#Subsets",
|
|
"matchingCase": false,
|
|
"explainSearch": false,
|
|
"collapseAll": false,
|
|
"extraContext": false,
|
|
"sortOrder": "alphabetical"
|
|
},
|
|
"icon": "lucide-search",
|
|
"title": "Search"
|
|
}
|
|
},
|
|
{
|
|
"id": "fffdf73e5f225916",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "bookmarks",
|
|
"state": {},
|
|
"icon": "lucide-bookmark",
|
|
"title": "Bookmarks"
|
|
}
|
|
},
|
|
{
|
|
"id": "671043c113c40804",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "file-explorer",
|
|
"state": {
|
|
"sortOrder": "alphabetical"
|
|
},
|
|
"icon": "lucide-folder-closed",
|
|
"title": "Files"
|
|
}
|
|
}
|
|
],
|
|
"currentTab": 2
|
|
}
|
|
],
|
|
"direction": "horizontal",
|
|
"width": 395.5
|
|
},
|
|
"right": {
|
|
"id": "ee8f6df41634f71e",
|
|
"type": "split",
|
|
"children": [
|
|
{
|
|
"id": "08c5be16080a33d4",
|
|
"type": "tabs",
|
|
"children": [
|
|
{
|
|
"id": "28df09223f5ff3ba",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "backlink",
|
|
"state": {
|
|
"file": "Penetration Testing/Week 7/Lecture 7 - Vulnerability Scanning.md",
|
|
"collapseAll": false,
|
|
"extraContext": false,
|
|
"sortOrder": "alphabetical",
|
|
"showSearch": false,
|
|
"searchQuery": "",
|
|
"backlinkCollapsed": false,
|
|
"unlinkedCollapsed": true
|
|
},
|
|
"icon": "links-coming-in",
|
|
"title": "Backlinks for Lecture 7 - Vulnerability Scanning"
|
|
}
|
|
},
|
|
{
|
|
"id": "7bc5b41711af1822",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "outgoing-link",
|
|
"state": {
|
|
"file": "Penetration Testing/Week 7/Lecture 7 - Vulnerability Scanning.md",
|
|
"linksCollapsed": false,
|
|
"unlinkedCollapsed": true
|
|
},
|
|
"icon": "links-going-out",
|
|
"title": "Outgoing links from Lecture 7 - Vulnerability Scanning"
|
|
}
|
|
},
|
|
{
|
|
"id": "1817c377e59b8531",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "tag",
|
|
"state": {
|
|
"sortOrder": "frequency",
|
|
"useHierarchy": true
|
|
},
|
|
"icon": "lucide-tags",
|
|
"title": "Tags"
|
|
}
|
|
},
|
|
{
|
|
"id": "3f130e3d308d39ed",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "outline",
|
|
"state": {
|
|
"file": "Penetration Testing/Week 7/Lecture 7 - Vulnerability Scanning.md"
|
|
},
|
|
"icon": "lucide-list",
|
|
"title": "Outline of Lecture 7 - Vulnerability Scanning"
|
|
}
|
|
},
|
|
{
|
|
"id": "2e33e92dc5f2fbae",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "all-properties",
|
|
"state": {
|
|
"sortOrder": "frequency",
|
|
"showSearch": false,
|
|
"searchQuery": ""
|
|
},
|
|
"icon": "lucide-archive",
|
|
"title": "All properties"
|
|
}
|
|
},
|
|
{
|
|
"id": "ff4e63a36b080692",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "git-view",
|
|
"state": {},
|
|
"icon": "git-pull-request",
|
|
"title": "Source Control"
|
|
}
|
|
},
|
|
{
|
|
"id": "390f03a34bed73fd",
|
|
"type": "leaf",
|
|
"state": {
|
|
"type": "mermaid-toolbar-view",
|
|
"state": {},
|
|
"icon": "trident-custom",
|
|
"title": "Mermaid Toolbar"
|
|
}
|
|
}
|
|
],
|
|
"currentTab": 5
|
|
}
|
|
],
|
|
"direction": "horizontal",
|
|
"width": 307.5
|
|
},
|
|
"left-ribbon": {
|
|
"hiddenItems": {
|
|
"graph:Open graph view": false,
|
|
"command-palette:Open command palette": false,
|
|
"switcher:Open quick switcher": false,
|
|
"obsidian-git:Open Git source control": false,
|
|
"obsidian-full-calendar:Open Full Calendar": false,
|
|
"omnisearch:Omnisearch": false,
|
|
"mermaid-tools:Open Mermaid Toolbar": false
|
|
}
|
|
},
|
|
"active": "d83bb0bbeeb86eec",
|
|
"lastOpenFiles": [
|
|
"Software Project with Agile Techinques/Assignment/lu12412ehlt.tmp",
|
|
"Data Structures/Past-Exam-Qestions.odt",
|
|
"Data Structures/lu12412ehlq.tmp",
|
|
"Data Structures/Week 7/Week 7.md",
|
|
"Penetration Testing/Week 7/Lecture 7 - Vulnerability Scanning.md",
|
|
"Penetration Testing/Week 7",
|
|
"Software Project with Agile Techinques/Assignment/Assignment 1.odt",
|
|
"Software Project with Agile Techinques/Assignment/lu12412ehh9.tmp",
|
|
"Penetration Testing/Week 6/Workshop 6.md",
|
|
"Data Structures/Week 7",
|
|
"Penetration Testing/Week 6/dns-exfil-infil/securecorp.txt",
|
|
"Penetration Testing/Week 6/dns-exfil-infil/requirements.txt",
|
|
"Penetration Testing/Week 6/dns-exfil-infil/packetySimple.py",
|
|
"Penetration Testing/Week 6/dns-exfil-infil/packetyGrabber.py",
|
|
"Penetration Testing/Week 6/dns-exfil-infil/README.md",
|
|
"Penetration Testing/Week 6/dns-exfil-infil/dns-exfil-infil/README.md",
|
|
"Pasted image 20241025143543.png",
|
|
"Pasted image 20241025141715.png",
|
|
"Pasted image 20241025141348.png",
|
|
"Software Project with Agile Techinques/Assignment/Assignment 1.md",
|
|
"AI & Data Mining/Week 6/Lecture 12 - Decision Trees (ID3).md",
|
|
"Pasted image 20241025132339.png",
|
|
"AI & Data Mining/Week 6/Lecture 11 - ID3.md",
|
|
"Pasted image 20241024132906.png",
|
|
"Pasted image 20241024132411.png",
|
|
"Client Server Systems/PHPStorm Repo/workshop6/images/new_uos_logo.jpg",
|
|
"Client Server Systems/PHPStorm Repo/workshop6/fonts/glyphicons-halflings-regular.svg",
|
|
"Penetration Testing/Week 6/Lecture 6 - Threat Modelling.md",
|
|
"Pasted image 20241024094143.png",
|
|
"Pasted image 20241024094123.png",
|
|
"AI & Data Mining/Week 5/Tutorial 9 - PRISM.md",
|
|
"AI & Data Mining/Week 5/Lecture 9 - PRISM.md",
|
|
"AI & Data Mining/Week 4/Workshop 4 - Nearest Neighbor.md",
|
|
"Networking and Security/Week 4/Workshop 4 - Routing.md",
|
|
"Penetration Testing/Week 4/Workshop 4 - Google Dorking.md",
|
|
"Penetration Testing/Week 4/Week 4 - Pre-Engagement.md",
|
|
"Penetration Testing/Week 3/Lecture 3 - Blue Team.md",
|
|
"Penetration Testing/Week 5/Lecture 5 - Reconnaisance.md",
|
|
"Data Structures/Week 5/Lecture 9 - Stacks.md",
|
|
"Client Server Systems/PHPStorm Repo/README.md",
|
|
"PHPStorm/README.md",
|
|
"Software Project with Agile Techinques/Week 3/Study Skills - Class Diagrams.md",
|
|
"README.md",
|
|
"AI & Data Mining/Week 4/Tutorial 4 - Nearest Neighbor.md",
|
|
"AI & Data Mining/Week 4/Lecture 7 - Nearest Neighbor.md",
|
|
"Penetration Testing/Week 3/Workshop 3 - netcat.md",
|
|
"Database Systems/Untitled.canvas",
|
|
"Untitled 1.canvas",
|
|
"Untitled.canvas"
|
|
]
|
|
} |