{"version":1,"pages":[{"id":"cGaWVzLj7YjcRjTnHwkN","title":"Introduction","pathname":"/redlotusguide","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"book-sparkles","description":"","breadcrumbs":[{"label":"ScreenSharing Introducttion and Principles"}]},{"id":"bWzXja7nOMo6Wrw29aD7","title":"What is a Hack Check (Screenshare)?","pathname":"/redlotusguide/screensharing-introducttion-and-principles/first-section-an-introduction-to-hack-checks-and-bypasses/what-is-a-hack-check","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"question","description":"","breadcrumbs":[{"label":"ScreenSharing Introducttion and Principles"},{"label":"Introduction","icon":"book-sparkles"}]},{"id":"kNMeG8cJB7NSKaUPJ9y7","title":"The Goal: Demonstrating Cheat Usage","pathname":"/redlotusguide/screensharing-introducttion-and-principles/first-section-an-introduction-to-hack-checks-and-bypasses/the-goal-demonstrating-cheat-usage","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"bullseye-arrow","description":"","breadcrumbs":[{"label":"ScreenSharing Introducttion and Principles"},{"label":"Introduction","icon":"book-sparkles"}]},{"id":"JRmJ9JIJ3rMORAs4TZzI","title":"The Staffer's Perspective and the Learning Process","pathname":"/redlotusguide/screensharing-introducttion-and-principles/first-section-an-introduction-to-hack-checks-and-bypasses/the-staffers-perspective-and-the-learning-process","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"eye","description":"","breadcrumbs":[{"label":"ScreenSharing Introducttion and Principles"},{"label":"Introduction","icon":"book-sparkles"}]},{"id":"TxghuSywl7sqO9cjGEEw","title":"Red Lotus Principles","pathname":"/redlotusguide/screensharing-introducttion-and-principles/second-section-red-lotus-principles","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"gavel","description":"","breadcrumbs":[{"label":"ScreenSharing Introducttion and Principles"}]},{"id":"jtrpKLyxMZbRXo60q8rh","title":"Red Lotus Principles for Ethical and Effective ScreenSharing","pathname":"/redlotusguide/screensharing-introducttion-and-principles/second-section-red-lotus-principles/red-lotus-principles-for-ethical-and-effective-screensharing","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"book-blank","description":"","breadcrumbs":[{"label":"ScreenSharing Introducttion and Principles"},{"label":"Red Lotus Principles","icon":"gavel"}]},{"id":"Kog82qwgH1cnzPcKoHZz","title":"Requirements for ScreenSharers","pathname":"/redlotusguide/screensharing-introducttion-and-principles/second-section-red-lotus-principles/requirements-for-screensharers","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"book-blank","description":"","breadcrumbs":[{"label":"ScreenSharing Introducttion and Principles"},{"label":"Red Lotus Principles","icon":"gavel"}]},{"id":"UnJ5zz99LvwCynP4e0Xf","title":"ScreenSharing Protocols (Video Recording)","pathname":"/redlotusguide/screensharing-introducttion-and-principles/second-section-red-lotus-principles/screensharing-protocols","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"video","description":"","breadcrumbs":[{"label":"ScreenSharing Introducttion and Principles"},{"label":"Red Lotus Principles","icon":"gavel"}]},{"id":"zaLotzXOPhaYt5DwIkKW","title":"Anti-Corruption Measures","pathname":"/redlotusguide/screensharing-introducttion-and-principles/second-section-red-lotus-principles/anti-corruption-measures","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"swords","description":"","breadcrumbs":[{"label":"ScreenSharing Introducttion and Principles"},{"label":"Red Lotus Principles","icon":"gavel"}]},{"id":"7Nr6jdF0lINFKCQtDaye","title":"Windows Fundamentals","pathname":"/redlotusguide/screensharing-general-knowledge/third-section-windows-fundamentals","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"desktop","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"}]},{"id":"xkBSvnf6s6AL1eUuZTWO","title":"File Systems: The Foundation","pathname":"/redlotusguide/screensharing-general-knowledge/third-section-windows-fundamentals/file-systems-the-foundation","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"folder-open","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Windows Fundamentals","icon":"desktop"}]},{"id":"oZvpXuRjb2jpst26wIB6","title":"File System (Definition, Types: NTFS, FAT32, etc.)","pathname":"/redlotusguide/screensharing-general-knowledge/third-section-windows-fundamentals/file-systems-the-foundation/file-system","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"copy","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Windows Fundamentals","icon":"desktop"},{"label":"File Systems: The Foundation","icon":"folder-open"}]},{"id":"33g0BVmVYN5WHOJGGZoo","title":"Journaling (Definition, Purpose)","pathname":"/redlotusguide/screensharing-general-knowledge/third-section-windows-fundamentals/file-systems-the-foundation/journaling","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"notebook","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Windows Fundamentals","icon":"desktop"},{"label":"File Systems: The Foundation","icon":"folder-open"}]},{"id":"tLeuriPTHWDhqDVTRmw5","title":"Fundamental Timestamps","pathname":"/redlotusguide/screensharing-general-knowledge/third-section-windows-fundamentals/fundamental-timestamps","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"clock","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Windows Fundamentals","icon":"desktop"}]},{"id":"5B8UHZjQnzyB41Z4YGff","title":"Key NTFS Components","pathname":"/redlotusguide/screensharing-general-knowledge/third-section-windows-fundamentals/key-ntfs-components","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"key","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Windows Fundamentals","icon":"desktop"}]},{"id":"ljcv5B0NTI62AOCrbZ0j","title":"Master File Table ($MFT) - The File Catalog","pathname":"/redlotusguide/screensharing-general-knowledge/third-section-windows-fundamentals/key-ntfs-components/master-file-table-the-file-catalog","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Windows Fundamentals","icon":"desktop"},{"label":"Key NTFS Components","icon":"key"}]},{"id":"nPXcZBGUSDiDQIRrnTdw","title":"The Journal ($USNJrnl) - The Change Log","pathname":"/redlotusguide/screensharing-general-knowledge/third-section-windows-fundamentals/key-ntfs-components/the-journal-the-change-log","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Windows Fundamentals","icon":"desktop"},{"label":"Key NTFS Components","icon":"key"}]},{"id":"oi8q39tpH7A2FLxgXsA8","title":"$LogFile (Metadata Log) - Specific Log for Metadata Changes","pathname":"/redlotusguide/screensharing-general-knowledge/third-section-windows-fundamentals/key-ntfs-components/logfile-specific-log-for-metadata-changes","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Windows Fundamentals","icon":"desktop"},{"label":"Key NTFS Components","icon":"key"}]},{"id":"jb66t9pciSORKGzL2Yau","title":"Alternate Data Streams (ADS) - Hidden Data Streams","pathname":"/redlotusguide/screensharing-general-knowledge/third-section-windows-fundamentals/key-ntfs-components/alternate-data-streams-hidden-data-streams","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Windows Fundamentals","icon":"desktop"},{"label":"Key NTFS Components","icon":"key"}]},{"id":"YSW5A1qG1iXqssQEDI48","title":"File Attributes (Read-Only, Hidden, etc.) - Manipulable Properties","pathname":"/redlotusguide/screensharing-general-knowledge/third-section-windows-fundamentals/key-ntfs-components/file-attributes-manipulable-properties","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Windows Fundamentals","icon":"desktop"},{"label":"Key NTFS Components","icon":"key"}]},{"id":"NdSGTPh3hvQ9SBeZRPjc","title":"Common Windows Artifacts and Their Basic Analysis","pathname":"/redlotusguide/screensharing-general-knowledge/fourth-section-common-windows-artifacts-and-their-basic-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"diamonds-4","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"}]},{"id":"0SBv8Vjzgc5WTAaALdMH","title":"Execution Traces and Recent Activity","pathname":"/redlotusguide/screensharing-general-knowledge/fourth-section-common-windows-artifacts-and-their-basic-analysis/execution-traces-and-recent-activity","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"badge-check","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Windows Artifacts and Their Basic Analysis","icon":"diamonds-4"}]},{"id":"scr7rl4r9HdCz5bQt18t","title":"Prefetch ( C:\\Windows\\Prefetch )","pathname":"/redlotusguide/screensharing-general-knowledge/fourth-section-common-windows-artifacts-and-their-basic-analysis/execution-traces-and-recent-activity/prefetch","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"folder-open","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Windows Artifacts and Their Basic Analysis","icon":"diamonds-4"},{"label":"Execution Traces and Recent Activity","icon":"badge-check"}]},{"id":"cdGNDCN0lAC9O0zFPqBh","title":"Temporary Files ( %temp% )","pathname":"/redlotusguide/screensharing-general-knowledge/fourth-section-common-windows-artifacts-and-their-basic-analysis/execution-traces-and-recent-activity/temporary-files","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"folder-open","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Windows Artifacts and Their Basic Analysis","icon":"diamonds-4"},{"label":"Execution Traces and Recent Activity","icon":"badge-check"}]},{"id":"4Rr25M6bStjVhlY3oO2X","title":"Recent Items ( shell:recent )","pathname":"/redlotusguide/screensharing-general-knowledge/fourth-section-common-windows-artifacts-and-their-basic-analysis/execution-traces-and-recent-activity/recent-items","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"folder-open","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Windows Artifacts and Their Basic Analysis","icon":"diamonds-4"},{"label":"Execution Traces and Recent Activity","icon":"badge-check"}]},{"id":"X6rhojFC95Q4ku8IDczr","title":"Recycle Bin ( C:$Recycle.bin )","pathname":"/redlotusguide/screensharing-general-knowledge/fourth-section-common-windows-artifacts-and-their-basic-analysis/execution-traces-and-recent-activity/recycle-bin","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"folder-open","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Windows Artifacts and Their Basic Analysis","icon":"diamonds-4"},{"label":"Execution Traces and Recent Activity","icon":"badge-check"}]},{"id":"tVhkUtcO2q4ZqSj2O9bn","title":"Other Notable Folders/Locations","pathname":"/redlotusguide/screensharing-general-knowledge/fourth-section-common-windows-artifacts-and-their-basic-analysis/other-notable-folderslocations","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"folder-open","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Windows Artifacts and Their Basic Analysis","icon":"diamonds-4"}]},{"id":"eRwP719KqXkGAvOXOfkE","title":"Windows Registry: Introduction","pathname":"/redlotusguide/screensharing-general-knowledge/fourth-section-common-windows-artifacts-and-their-basic-analysis/windows-registry-introduction","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"registered","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Windows Artifacts and Their Basic Analysis","icon":"diamonds-4"}]},{"id":"9AFvFROOjIO4WBwdl72o","title":"Registry Structure: Hives, Keys, and Values","pathname":"/redlotusguide/screensharing-general-knowledge/fourth-section-common-windows-artifacts-and-their-basic-analysis/windows-registry-introduction/registry-structure-hives-keys-and-values","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"bee","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Windows Artifacts and Their Basic Analysis","icon":"diamonds-4"},{"label":"Windows Registry: Introduction","icon":"registered"}]},{"id":"0KSOm5oQOWZehWB9X20y","title":"Registry Value Types (Brief Overview)","pathname":"/redlotusguide/screensharing-general-knowledge/fourth-section-common-windows-artifacts-and-their-basic-analysis/windows-registry-introduction/registry-value-types","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"envelope-open-text","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Windows Artifacts and Their Basic Analysis","icon":"diamonds-4"},{"label":"Windows Registry: Introduction","icon":"registered"}]},{"id":"ek87Et2lRflyQjNg2oME","title":"Windows Event Logs: Introduction","pathname":"/redlotusguide/screensharing-general-knowledge/fourth-section-common-windows-artifacts-and-their-basic-analysis/windows-event-logs-introduction","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"album-collection","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Windows Artifacts and Their Basic Analysis","icon":"diamonds-4"}]},{"id":"n0BMkma7MYvT7iQlWlmx","title":"Event Log Structure ( .evtx Files)","pathname":"/redlotusguide/screensharing-general-knowledge/fourth-section-common-windows-artifacts-and-their-basic-analysis/windows-event-logs-introduction/event-log-structure","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Windows Artifacts and Their Basic Analysis","icon":"diamonds-4"},{"label":"Windows Event Logs: Introduction","icon":"album-collection"}]},{"id":"NMVgEepHQb6EmHYAL7BX","title":"The EventLog Service","pathname":"/redlotusguide/screensharing-general-knowledge/fourth-section-common-windows-artifacts-and-their-basic-analysis/windows-event-logs-introduction/the-eventlog-service","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Windows Artifacts and Their Basic Analysis","icon":"diamonds-4"},{"label":"Windows Event Logs: Introduction","icon":"album-collection"}]},{"id":"n2YFXluNJ4Xc1SGofb30","title":"Event Viewer ( eventvwr.msc )","pathname":"/redlotusguide/screensharing-general-knowledge/fourth-section-common-windows-artifacts-and-their-basic-analysis/windows-event-logs-introduction/event-viewer","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Windows Artifacts and Their Basic Analysis","icon":"diamonds-4"},{"label":"Windows Event Logs: Introduction","icon":"album-collection"}]},{"id":"So5OKo9XUBSVsVRnA2XC","title":"Manual SS Techniques (Basic and Intermediate)","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"magnifying-glass","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"}]},{"id":"ygjcIccoKBzdx9UWHC0S","title":"Introduction to Process and Memory Analysis","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/introduction-to-process-and-memory-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"memory","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"}]},{"id":"C4OWcAvFgSIHQTiepOHJ","title":"Process Hacker / System Informer: Introduction and Configuration","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/process-hacker-system-informer-introduction-and-configuration","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"microchip","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"}]},{"id":"yIsA2IIsagx8s9E7eM7m","title":"Key Capabilities for ScreenSharing:","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/process-hacker-system-informer-introduction-and-configuration/key-capabilities-for-screensharing","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Process Hacker / System Informer: Introduction and Configuration","icon":"microchip"}]},{"id":"jRSojDpSP8fXFcUeu5NW","title":"Configuration: Enabling Kernel Mode Driver","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/process-hacker-system-informer-introduction-and-configuration/configuration-enabling-kernel-mode-driver","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Process Hacker / System Informer: Introduction and Configuration","icon":"microchip"}]},{"id":"SpXQQG98QyEMQul6HVcR","title":"General Process Filtering Steps:","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/process-hacker-system-informer-introduction-and-configuration/general-process-filtering-steps","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Process Hacker / System Informer: Introduction and Configuration","icon":"microchip"}]},{"id":"iceSONlxTWZjIv0vbjcO","title":"Specific Processes to Analyze and Search Patterns","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/specific-processes-to-analyze-and-search-patterns","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"microchip","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"}]},{"id":"zTlknAbUxtVtx9OWfor1","title":"explorer.exe (Windows Explorer)","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/specific-processes-to-analyze-and-search-patterns/1-explorerexe","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Specific Processes to Analyze and Search Patterns","icon":"microchip"}]},{"id":"uvrLkHp40pInIoI2mDX4","title":"csrss.exe (Client Server Runtime Subsystem)","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/specific-processes-to-analyze-and-search-patterns/2-csrssexe","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Specific Processes to Analyze and Search Patterns","icon":"microchip"}]},{"id":"HhWn7QVoviGNM7v5OUuy","title":"PlugPlay Service (Sometimes shown under DCOMLaunch)","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/specific-processes-to-analyze-and-search-patterns/3-plugplay-service","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Specific Processes to Analyze and Search Patterns","icon":"microchip"}]},{"id":"1HhxZTMDuW1ughZbWyBo","title":"svchost.exe (-s dps) (Diagnostic Policy Service)","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/specific-processes-to-analyze-and-search-patterns/4-svchostexe","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Specific Processes to Analyze and Search Patterns","icon":"microchip"}]},{"id":"QVJyYmeg3WqjIeYjRMzJ","title":"PcaSvc (Program Compatibility Assistant Service)","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/specific-processes-to-analyze-and-search-patterns/5-pcasvc","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Specific Processes to Analyze and Search Patterns","icon":"microchip"}]},{"id":"DZPMMKpRmoUGS19CXMod","title":"Other Relevant Processes","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/specific-processes-to-analyze-and-search-patterns/6-other-relevant-processes","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Specific Processes to Analyze and Search Patterns","icon":"microchip"}]},{"id":"cO3wMRUzEhOpi4OOnT74","title":"Windows Prefetch Analysis (WinPrefetchView / PECmd)","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/windows-prefetch-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"folder-open","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"}]},{"id":"nVndzZXozkQzLGvnnktH","title":"Understanding Prefetch","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/windows-prefetch-analysis/understanding-prefetch","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Windows Prefetch Analysis (WinPrefetchView / PECmd)","icon":"folder-open"}]},{"id":"OVe6geudQyL9bsQwWccK","title":"Information Stored in Prefetch Files","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/windows-prefetch-analysis/information-stored-in-prefetch-files","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Windows Prefetch Analysis (WinPrefetchView / PECmd)","icon":"folder-open"}]},{"id":"yqV1ktJjhf7E2h03GWTF","title":"Analysis Tools","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/windows-prefetch-analysis/analysis-tools","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Windows Prefetch Analysis (WinPrefetchView / PECmd)","icon":"folder-open"}]},{"id":"9uaROTXs61SpSlO4VjAD","title":"Troubleshooting and Evasion Detection","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/windows-prefetch-analysis/troubleshooting-and-evasion-detection","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Windows Prefetch Analysis (WinPrefetchView / PECmd)","icon":"folder-open"}]},{"id":"9TfHaRzhqrWGJjZGu1V6","title":"LastActivityView: Artifact Aggregation","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/lastactivityview-artifact-aggregation","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"cabinet-filing","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"}]},{"id":"008GwVOI7sajQHFjVajy","title":"Data Sources","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/lastactivityview-artifact-aggregation/data-sources","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"LastActivityView: Artifact Aggregation","icon":"cabinet-filing"}]},{"id":"ZpHnZM9312Zjxm1v42ZW","title":"Functionality in ScreenSharing","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/lastactivityview-artifact-aggregation/functionality-in-screensharing","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"LastActivityView: Artifact Aggregation","icon":"cabinet-filing"}]},{"id":"1QQCMi4ajIL5c4n0eW0R","title":"Limitations and Considerations","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/lastactivityview-artifact-aggregation/limitations-and-considerations","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"LastActivityView: Artifact Aggregation","icon":"cabinet-filing"}]},{"id":"QZJC0CGmJpXkUnbeuOHo","title":"Search Everything: Rapid File System Search","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/search-everything-rapid-file-system-search","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"magnifying-glass-plus","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"}]},{"id":"7UndwsNKl9Byz6fDk3rm","title":"Core Features","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/search-everything-rapid-file-system-search/core-features","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Search Everything: Rapid File System Search","icon":"magnifying-glass-plus"}]},{"id":"tIil7E37wBwn0KBUZHwd","title":"Usage in ScreenSharing","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/search-everything-rapid-file-system-search/usage-in-screensharing","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Search Everything: Rapid File System Search","icon":"magnifying-glass-plus"}]},{"id":"Cah3JhcH1Ba9hzX3CNNi","title":"Journal Analysis (JournalTrace / Echo Easy Journal Viewer)","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/journal-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"notebook","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"}]},{"id":"mKfSM5AgOIARVM76NS5W","title":"The USN Journal ( $UsnJrnl )","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/journal-analysis/the-usn-journal","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Journal Analysis (JournalTrace / Echo Easy Journal Viewer)","icon":"notebook"}]},{"id":"pl4uobLGFGzWlK0f7NR0","title":"GUI Parsing Tools","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/journal-analysis/gui-parsing-tools","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Journal Analysis (JournalTrace / Echo Easy Journal Viewer)","icon":"notebook"}]},{"id":"Dt42VBxxIAh51waXQinp","title":"Application in ScreenSharing","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/journal-analysis/application-in-screensharing","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Journal Analysis (JournalTrace / Echo Easy Journal Viewer)","icon":"notebook"}]},{"id":"4bFv1KGN8U5yD2EqY3yf","title":"Limitations","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/journal-analysis/limitations","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Journal Analysis (JournalTrace / Echo Easy Journal Viewer)","icon":"notebook"}]},{"id":"KX9HgAv0UfKzQzVIDwxy","title":"Regedit / Registry Explorer (Registry Viewers - Basic Usage)","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/regedit-registry-explorer","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"registered","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"}]},{"id":"zSf9e9o3Q48WmKWVSVLV","title":"Understanding the Windows Registry","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/regedit-registry-explorer/understanding-the-windows-registry","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Regedit / Registry Explorer (Registry Viewers - Basic Usage)","icon":"registered"}]},{"id":"NFEVfwYEaSfcr6ZahLWl","title":"Accessing the Registry","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/regedit-registry-explorer/accessing-the-registry","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Regedit / Registry Explorer (Registry Viewers - Basic Usage)","icon":"registered"}]},{"id":"6ckgOpey2esN1nFBT80W","title":"Forensically Relevant Registry Keys/Locations","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/regedit-registry-explorer/forensically-relevant-registry-keyslocations","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Regedit / Registry Explorer (Registry Viewers - Basic Usage)","icon":"registered"}]},{"id":"wJVO0c2JmeqKDxTi5vt9","title":"Key Considerations for ScreenSharing","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/regedit-registry-explorer/key-considerations-for-screensharing","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Regedit / Registry Explorer (Registry Viewers - Basic Usage)","icon":"registered"}]},{"id":"vZ4N238yOlzGMZxun0cE","title":"Event Viewer (Basic Usage for Common IDs)","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/event-viewer","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"calendar-days","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"}]},{"id":"8CJbZthg1FnneYZ1CZRJ","title":"Understanding Event Viewer","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/event-viewer/understanding-event-viewer","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Event Viewer (Basic Usage for Common IDs)","icon":"calendar-days"}]},{"id":"D5n61LxYXW2pFOcBWsVZ","title":"Accessing Event Viewer","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/event-viewer/accessing-event-viewer","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Event Viewer (Basic Usage for Common IDs)","icon":"calendar-days"}]},{"id":"wlLZ3PymAXIlAN2TevsX","title":"Log Storage","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/event-viewer/log-storage","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Event Viewer (Basic Usage for Common IDs)","icon":"calendar-days"}]},{"id":"0UP6SO2BmTKVEO5c5ybe","title":"Checking the EventLog Service","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/event-viewer/checking-the-eventlog-service","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Event Viewer (Basic Usage for Common IDs)","icon":"calendar-days"}]},{"id":"rdgNFNwr80wFgs0tTg4W","title":"Key Event Logs and IDs for ScreenSharing","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/event-viewer/key-event-logs-and-ids-for-screensharing","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Event Viewer (Basic Usage for Common IDs)","icon":"calendar-days"}]},{"id":"lCfmIruiiKoHVQzWVRab","title":"Key Considerations for ScreenSharing","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/event-viewer/key-considerations-for-screensharing","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Event Viewer (Basic Usage for Common IDs)","icon":"calendar-days"}]},{"id":"jhipPk1BJuBdkoxEYKd9","title":"Recuva (Deleted File Recovery)","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/recuva","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"trash-can","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"}]},{"id":"V2OlIEQX1WUN0195lW5i","title":"Understanding Recuva","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/recuva/understanding-recuva","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Recuva (Deleted File Recovery)","icon":"trash-can"}]},{"id":"QeWGWmjW6IsXVfbYrh3b","title":"Usage in ScreenSharing","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/recuva/usage-in-screensharing","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Recuva (Deleted File Recovery)","icon":"trash-can"}]},{"id":"beGjYQEe3rc7aRbANDmY","title":"Limitations","pathname":"/redlotusguide/screensharing-general-knowledge/seventh-section-manual-ss-techniques/recuva/limitations","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Manual SS Techniques (Basic and Intermediate)","icon":"magnifying-glass"},{"label":"Recuva (Deleted File Recovery)","icon":"trash-can"}]},{"id":"yB9sEjnTlY78e0bu0Vdx","title":"More Artifact Analysis for ScreenSharing","pathname":"/redlotusguide/screensharing-general-knowledge/ninth-section-more-artifact-analysis-for-screensharing","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"circle-caret-down","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"}]},{"id":"Lx1TgAbjeJfcfMVkNj6g","title":"Advanced JumpLists/RecentDocs Analysis","pathname":"/redlotusguide/screensharing-general-knowledge/ninth-section-more-artifact-analysis-for-screensharing/advanced-jumplistsrecentdocs-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"link","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"More Artifact Analysis for ScreenSharing","icon":"circle-caret-down"}]},{"id":"TSIwMW30kq93sOGBjJHx","title":"Amcache/Syscache/RecentFileCache Analysis","pathname":"/redlotusguide/screensharing-general-knowledge/ninth-section-more-artifact-analysis-for-screensharing/amcachesyscacherecentfilecache-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"file-circle-question","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"More Artifact Analysis for ScreenSharing","icon":"circle-caret-down"}]},{"id":"1SK2iQ5s2Tw5wIUkbZKf","title":"Activities Cache Analysis","pathname":"/redlotusguide/screensharing-general-knowledge/ninth-section-more-artifact-analysis-for-screensharing/activities-cache-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"page","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"More Artifact Analysis for ScreenSharing","icon":"circle-caret-down"}]},{"id":"chsNY6hFksV2fUJM6X4n","title":"SRUM (System Resource Usage Monitor) Analysis","pathname":"/redlotusguide/screensharing-general-knowledge/ninth-section-more-artifact-analysis-for-screensharing/srum-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"page","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"More Artifact Analysis for ScreenSharing","icon":"circle-caret-down"}]},{"id":"1PFcSR1GfcMPsb3dD07l","title":"Volume Shadow Copies (VSS) Analysis","pathname":"/redlotusguide/screensharing-general-knowledge/ninth-section-more-artifact-analysis-for-screensharing/volume-shadow-copies-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"paste","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"More Artifact Analysis for ScreenSharing","icon":"circle-caret-down"}]},{"id":"Awb3FuaPmIE5WQx1jh4K","title":"$INDX ($i30 Index Attributes) Analysis","pathname":"/redlotusguide/screensharing-general-knowledge/ninth-section-more-artifact-analysis-for-screensharing/indx-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"indent","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"More Artifact Analysis for ScreenSharing","icon":"circle-caret-down"}]},{"id":"a7Bzq925u7sVCdyFtynD","title":"Process and Memory Dump Analysis (Kernel Live Dump, RAM Dump)","pathname":"/redlotusguide/screensharing-general-knowledge/ninth-section-more-artifact-analysis-for-screensharing/process-and-memory-dump-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"microchip","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"More Artifact Analysis for ScreenSharing","icon":"circle-caret-down"}]},{"id":"SA2ie0cUqiOeEOW9K0Vp","title":"YARA Rules","pathname":"/redlotusguide/screensharing-general-knowledge/ninth-section-more-artifact-analysis-for-screensharing/yara-rules","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"ruler","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"More Artifact Analysis for ScreenSharing","icon":"circle-caret-down"}]},{"id":"4cccR5XcGse7iPf7iIZE","title":"File Entropy Analysis","pathname":"/redlotusguide/screensharing-general-knowledge/ninth-section-more-artifact-analysis-for-screensharing/file-entropy-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"atom","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"More Artifact Analysis for ScreenSharing","icon":"circle-caret-down"}]},{"id":"zsx7blqSAH86td389M1J","title":"Detect It Easy (DiE)","pathname":"/redlotusguide/screensharing-general-knowledge/ninth-section-more-artifact-analysis-for-screensharing/detect-it-easy","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"user-secret","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"More Artifact Analysis for ScreenSharing","icon":"circle-caret-down"}]},{"id":"z5Iaz4o4S0EAk8YcDKKI","title":"Velociraptor","pathname":"/redlotusguide/screensharing-general-knowledge/ninth-section-more-artifact-analysis-for-screensharing/velociraptor","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"crystal-ball","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"More Artifact Analysis for ScreenSharing","icon":"circle-caret-down"}]},{"id":"AODYBHAPIkBT7MrSFVVp","title":"Magnet EDD (Encrypted Disk Detector)","pathname":"/redlotusguide/screensharing-general-knowledge/ninth-section-more-artifact-analysis-for-screensharing/magnet-edd","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"memory","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"More Artifact Analysis for ScreenSharing","icon":"circle-caret-down"}]},{"id":"rcRoV0TO0sVNC2jfmutO","title":"Common Bypass Techniques in ScreenSharing","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"ghost","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"}]},{"id":"9Ff9sia0wVJC7X6r9LWG","title":"Introduction to Bypass Categories","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/introduction-to-bypass-categories","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"person-to-portal","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"r4so9ycNkf9RkNzKAUmh","title":"Concealment and Obfuscation","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/concealment-and-obfuscation","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"eye-slash","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"mZhO0K69Bcqz4gRn8Lwp","title":"Spoofed Extensions","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/concealment-and-obfuscation/1-spoofed-extensions","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Concealment and Obfuscation","icon":"eye-slash"}]},{"id":"M3z5Bj8tH13R3NuWcFrf","title":"Unicode Characters in File Names/Paths","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/concealment-and-obfuscation/2-unicode-characters-in-file-namespaths","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Concealment and Obfuscation","icon":"eye-slash"}]},{"id":"bxMFTllxTzEMXvkxX3a5","title":"Alternate Data Streams (ADS)","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/concealment-and-obfuscation/3-alternate-data-streams","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Concealment and Obfuscation","icon":"eye-slash"}]},{"id":"fl4Q3tFtxTLbeuenZp3g","title":"Code Obfuscation","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/concealment-and-obfuscation/4-code-obfuscation","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Concealment and Obfuscation","icon":"eye-slash"}]},{"id":"twLRWNDxucUS8LPgvbCJ","title":"Steganography","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/steganography","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"fingerprint","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"WcOuy1tUjxr1qXnEQlHY","title":"Artifact and System Manipulation","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/artifact-and-system-manipulation","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"hammer-crash","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"7YAGOuFw3l1AsIbmi1Y7","title":"Timestamp Manipulation (Timestomping)","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/artifact-and-system-manipulation/timestamp-manipulation","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Artifact and System Manipulation","icon":"hammer-crash"}]},{"id":"KDzJ5uW3KD6YOn0wYDdA","title":"Hexadecimal File Modification (Hex Editing)","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/artifact-and-system-manipulation/hexadecimal-file-modification","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Artifact and System Manipulation","icon":"hammer-crash"}]},{"id":"mztsFODUDUmLaXZ8j8qE","title":"Attribute Manipulation (Read-Only)","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/artifact-and-system-manipulation/attribute-manipulation","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Artifact and System Manipulation","icon":"hammer-crash"}]},{"id":"al9pgclIxJGTe9Qqu2Tx","title":"Service Thread Suspension","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/artifact-and-system-manipulation/service-thread-suspension","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Artifact and System Manipulation","icon":"hammer-crash"}]},{"id":"qDhjpznQpEXPdwwwJHFe","title":"Command Prompt (CMD) Obfuscation","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/artifact-and-system-manipulation/command-prompt-obfuscation","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Artifact and System Manipulation","icon":"hammer-crash"}]},{"id":"cxSL2HSlO7eX87bbcMOE","title":"Disabling System Features via Registry/Group Policy","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/artifact-and-system-manipulation/disabling-system-features-via-registrygroup-policy","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Artifact and System Manipulation","icon":"hammer-crash"}]},{"id":"CHWAmEIvFpdfyoK7Qrak","title":"Artifact Clearing Techniques","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/artifact-clearing-techniques","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"broom-wide","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"feRWzVcuz4XUagN7Z9uF","title":"Prefetch Clearing","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/artifact-clearing-techniques/prefetch-clearing","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Artifact Clearing Techniques","icon":"broom-wide"}]},{"id":"JQnAFMfvk1KSwcqHnb3q","title":"Registry Clearing (BAM, RecentDocs, etc.)","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/artifact-clearing-techniques/registry-clearing","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Artifact Clearing Techniques","icon":"broom-wide"}]},{"id":"dW1oqVdGvMgyCJ3ai7VO","title":"USN Journal Clearing","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/artifact-clearing-techniques/usn-journal-clearing","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Artifact Clearing Techniques","icon":"broom-wide"}]},{"id":"fOzoNz3pOqs2vFeTjtal","title":"Event Log Clearing/Manipulation","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/artifact-clearing-techniques/event-log-clearingmanipulation","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Artifact Clearing Techniques","icon":"broom-wide"}]},{"id":"Q6PHmie1Cn1cAHR5yJcd","title":"Recycle Bin Clearing","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/artifact-clearing-techniques/recycle-bin-clearing","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Artifact Clearing Techniques","icon":"broom-wide"}]},{"id":"Yt9huFtpiztMFEQcHvgY","title":"File Replacement (Replace Method)","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/artifact-clearing-techniques/file-replacement","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Artifact Clearing Techniques","icon":"broom-wide"}]},{"id":"XaE3M4hFqk86krWK5rYF","title":"Permission and Inheritance Modification","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/permission-and-inheritance-modification","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"ticket-perforated","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"DkovLJTbUfqxFJTM6LC6","title":"Using cacls (or similar) for Permission Changes","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/permission-and-inheritance-modification/using-cacls-for-permission-changes","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Permission and Inheritance Modification","icon":"ticket-perforated"}]},{"id":"LW408fa5eg7pUzneom8S","title":"Disabling Registry/Folder Inheritance","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/permission-and-inheritance-modification/disabling-registryfolder-inheritance","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Permission and Inheritance Modification","icon":"ticket-perforated"}]},{"id":"AL2YO9Hs0Owedzl7Lkxh","title":"Disk Partition Manipulation for Evasion","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/disk-partition-manipulation-for-evasion","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"usb-drive","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"88HeDwaCiVZqTsq8vgUK","title":"Mechanism of Evasion","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/disk-partition-manipulation-for-evasion/mechanism-of-evasion","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Disk Partition Manipulation for Evasion","icon":"usb-drive"}]},{"id":"tZgxBXluzsusfUNcCUXH","title":"Forensic Implications","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/disk-partition-manipulation-for-evasion/forensic-implications","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Disk Partition Manipulation for Evasion","icon":"usb-drive"}]},{"id":"LvZkR8fTEOJzDKqqJkdx","title":"Task Scheduler Bypass Techniques","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/task-scheduler-bypass-techniques","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"diagram-subtask","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"xQ7eowseL6vS69ODek1t","title":"Mechanism of Evasion","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/task-scheduler-bypass-techniques/mechanism-of-evasion","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Task Scheduler Bypass Techniques","icon":"diagram-subtask"}]},{"id":"dhY59HrMQTg3lRBZ2pv5","title":"Detection","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/task-scheduler-bypass-techniques/detection","siteSpaceId":"sitesp_uxDYW","lang":"en","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Task Scheduler Bypass Techniques","icon":"diagram-subtask"}]},{"id":"znMaAM8EmDuJVk54lxBG","title":"Scripting Languages for Evasion","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/scripting-languages-for-evasion","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"rectangle-code","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"mp4ddEoc8GgOey2tmAnk","title":"Mechanisms of Evasion","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/scripting-languages-for-evasion/mechanisms-of-evasion","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Scripting Languages for Evasion","icon":"rectangle-code"}]},{"id":"sePki84DUrErV46SpWND","title":"Forensic Implications","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/scripting-languages-for-evasion/forensic-implications","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Scripting Languages for Evasion","icon":"rectangle-code"}]},{"id":"q83m4UwnIKstvXnpKyQb","title":"Fileless Malware and Living-off-the-Land Binaries (LOLBins)","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/fileless-malware-and-living-off-the-land-binaries","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"rectangle-terminal","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"536Z7PHhjt9KEOkormp5","title":"Mechanisms of Evasion","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/fileless-malware-and-living-off-the-land-binaries/mechanisms-of-evasion","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Fileless Malware and Living-off-the-Land Binaries (LOLBins)","icon":"rectangle-terminal"}]},{"id":"ZkpRcdPOp6EARcpgNoiN","title":"Forensic Implications and Detection","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/fileless-malware-and-living-off-the-land-binaries/forensic-implications-and-detection","siteSpaceId":"sitesp_uxDYW","lang":"en","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Fileless Malware and Living-off-the-Land Binaries (LOLBins)","icon":"rectangle-terminal"}]},{"id":"pAudBBXfou11ETT28Ilo","title":"COM Hijacking","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/com-hijacking","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"atom-simple","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"Lm0NQlbgW3AcuxuS7iDW","title":"Shellcode Injection","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/shellcode-injection","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"turtle","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"xXFB5uany8fq6gVQkHxh","title":"Powershell Remoting","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/powershell-remoting","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"tower-cell","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"EAeL4IkxWA1LifeUYWe2","title":"Suspicious DLLs and DLL Injection Techniques","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/suspicious-dlls-and-dll-injection-techniques","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"syringe","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"VzrTfo4W57lJRicgFR6B","title":"Process Hollowing","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/process-hollowing","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"coffin","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"Bqy316VeeY1llrGXYw33","title":"Unsigned / Fake Digital Signatures","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/fake-digital-signatures","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"face-lying","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"B853fXg4Ei3C83fIsKpA","title":"Environment and Hardware Bypasses","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/environment-and-hardware-bypasses","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"computer-classic","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"}]},{"id":"HeiM3PbLXogHvSXe6qw5","title":"External USB Drives (FAT32 vs. NTFS):","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/environment-and-hardware-bypasses/external-usb-drives","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Environment and Hardware Bypasses","icon":"computer-classic"}]},{"id":"1kpGqYqAi3M6WQzQWQIy","title":"Virtual Machines (VMs):","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/environment-and-hardware-bypasses/virtual-machines","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Environment and Hardware Bypasses","icon":"computer-classic"}]},{"id":"u857XbwKtztjlqTBGQcw","title":"Cloud Storage (OneDrive, Google Drive, etc.):","pathname":"/redlotusguide/screensharing-general-knowledge/eighth-section-common-bypass-techniques-in-screensharing/environment-and-hardware-bypasses/cloud-storage","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Common Bypass Techniques in ScreenSharing","icon":"ghost"},{"label":"Environment and Hardware Bypasses","icon":"computer-classic"}]},{"id":"ct0atNGheLMZAbxl09Qc","title":"Ban Evasion and Alt Account Detection","pathname":"/redlotusguide/screensharing-general-knowledge/ban-evasion-and-alt-account-detection","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"user-police","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"}]},{"id":"UZH2Y0FispEYuhtFUeO5","title":"Understanding Ban Evasion","pathname":"/redlotusguide/screensharing-general-knowledge/ban-evasion-and-alt-account-detection/understanding-ban-evasion","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"gavel","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Ban Evasion and Alt Account Detection","icon":"user-police"}]},{"id":"vFlPfAfWF8dumgKIvoQO","title":"Identifying Alternate Accounts During ScreenShare","pathname":"/redlotusguide/screensharing-general-knowledge/ban-evasion-and-alt-account-detection/identifying-alternate-accounts-during-screenshare","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"magnifying-glass-chart","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Ban Evasion and Alt Account Detection","icon":"user-police"}]},{"id":"AAUtuW5mXy8M4sfLq8Cs","title":"Reviewing Ban Policies","pathname":"/redlotusguide/screensharing-general-knowledge/ban-evasion-and-alt-account-detection/reviewing-ban-policies","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"file-lines","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Ban Evasion and Alt Account Detection","icon":"user-police"}]},{"id":"kANqcxpos2xk5zHA94et","title":"Importance of Documentation and Evidence","pathname":"/redlotusguide/screensharing-general-knowledge/ban-evasion-and-alt-account-detection/importance-of-documentation-and-evidence","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"images","description":"","breadcrumbs":[{"label":"ScreenSharing General Knowledge"},{"label":"Ban Evasion and Alt Account Detection","icon":"user-police"}]},{"id":"CTZr4GhIlREAADMj3HKw","title":"Minecraft Architecture and Analysis","pathname":"/redlotusguide/screensharing-minecraft-knowledge/fifth-section-specific-context-minecraft","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"pickaxe","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"}]},{"id":"XbuV6obq62nsJai3HpOT","title":"Minecraft and Java","pathname":"/redlotusguide/screensharing-minecraft-knowledge/fifth-section-specific-context-minecraft/minecraft-and-java","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"java","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Minecraft Architecture and Analysis","icon":"pickaxe"}]},{"id":"OjJuXfZwDpn22oz6uzXj","title":"Minecraft Architecture (Java, JVM)","pathname":"/redlotusguide/screensharing-minecraft-knowledge/fifth-section-specific-context-minecraft/minecraft-and-java/minecraft-architecture","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Minecraft Architecture and Analysis","icon":"pickaxe"},{"label":"Minecraft and Java","icon":"java"}]},{"id":"MO5NOJKYi0mqijzBVZ4D","title":"Launchers (Official, Custom: Lunar, Badlion, etc.)","pathname":"/redlotusguide/screensharing-minecraft-knowledge/fifth-section-specific-context-minecraft/minecraft-and-java/launchers","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Minecraft Architecture and Analysis","icon":"pickaxe"},{"label":"Minecraft and Java","icon":"java"}]},{"id":"9z2cyDWZNzM1kyBxlUQ1","title":".minecraft Folder (Location, Structure)","pathname":"/redlotusguide/screensharing-minecraft-knowledge/fifth-section-specific-context-minecraft/minecraft-and-java/minecraft-folder","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Minecraft Architecture and Analysis","icon":"pickaxe"},{"label":"Minecraft and Java","icon":"java"}]},{"id":"8kjfl1JC3XOVrP5q9nPa","title":"Categorizing Minecraft Cheats (Context for Analysis)","pathname":"/redlotusguide/screensharing-minecraft-knowledge/fifth-section-specific-context-minecraft/minecraft-and-java/categorizing-minecraft-cheats-context-for-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Minecraft Architecture and Analysis","icon":"pickaxe"},{"label":"Minecraft and Java","icon":"java"}]},{"id":"IlzpMnzv0xvmKKTy00Xj","title":"Specific Analysis for Minecraft","pathname":"/redlotusguide/screensharing-minecraft-knowledge/fifth-section-specific-context-minecraft/specific-analysis-for-minecraft","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"hammer-brush","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Minecraft Architecture and Analysis","icon":"pickaxe"}]},{"id":"egdFQtkNnYOstYdgPneU","title":"Forge Mod Analysis","pathname":"/redlotusguide/screensharing-minecraft-knowledge/fifth-section-specific-context-minecraft/specific-analysis-for-minecraft/forge-mod-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Minecraft Architecture and Analysis","icon":"pickaxe"},{"label":"Specific Analysis for Minecraft","icon":"hammer-brush"}]},{"id":"1w42rwbniELc1sog1K5Q","title":"Javaedit - Detection via Hash/Content","pathname":"/redlotusguide/screensharing-minecraft-knowledge/fifth-section-specific-context-minecraft/specific-analysis-for-minecraft/javaedit-detection-via-hashcontent","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Minecraft Architecture and Analysis","icon":"pickaxe"},{"label":"Specific Analysis for Minecraft","icon":"hammer-brush"}]},{"id":"9Xau60OqWyCEWZk1cL7k","title":"Mouse, Macro, and Input Analysis","pathname":"/redlotusguide/screensharing-minecraft-knowledge/sixth-section-mouse-macro-and-input-analysis-in-screensharing","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"computer-mouse","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"}]},{"id":"Qzda6pKilDn42UB1iVRX","title":"Understanding Mouse Input Manipulation","pathname":"/redlotusguide/screensharing-minecraft-knowledge/sixth-section-mouse-macro-and-input-analysis-in-screensharing/1-understanding-mouse-input-manipulation","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"seal-exclamation","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Mouse, Macro, and Input Analysis","icon":"computer-mouse"}]},{"id":"KmQZDRtVFwdm9VmUSDEO","title":"Macro Analysis","pathname":"/redlotusguide/screensharing-minecraft-knowledge/sixth-section-mouse-macro-and-input-analysis-in-screensharing/2-macro-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"laptop-code","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Mouse, Macro, and Input Analysis","icon":"computer-mouse"}]},{"id":"t9mw1YRLJhe8AzfbX5N2","title":"Definition and Purpose in Cheating","pathname":"/redlotusguide/screensharing-minecraft-knowledge/sixth-section-mouse-macro-and-input-analysis-in-screensharing/2-macro-analysis/definition-and-purpose-in-cheating","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Mouse, Macro, and Input Analysis","icon":"computer-mouse"},{"label":"Macro Analysis","icon":"laptop-code"}]},{"id":"xnQ7x6BKIcOC5J1rtmmR","title":"Detecting Software-Based Macros","pathname":"/redlotusguide/screensharing-minecraft-knowledge/sixth-section-mouse-macro-and-input-analysis-in-screensharing/2-macro-analysis/detecting-software-based-macros","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Mouse, Macro, and Input Analysis","icon":"computer-mouse"},{"label":"Macro Analysis","icon":"laptop-code"}]},{"id":"NQ97NAFGsWcc1xsnxkZe","title":"Detecting On-Board Macros","pathname":"/redlotusguide/screensharing-minecraft-knowledge/sixth-section-mouse-macro-and-input-analysis-in-screensharing/2-macro-analysis/detecting-on-board-macros","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Mouse, Macro, and Input Analysis","icon":"computer-mouse"},{"label":"Macro Analysis","icon":"laptop-code"}]},{"id":"CGZnBH0zLE4skk7qVvpi","title":"Debounce Time Analysis","pathname":"/redlotusguide/screensharing-minecraft-knowledge/sixth-section-mouse-macro-and-input-analysis-in-screensharing/3-debounce-time-analysis","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"hourglass-end","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Mouse, Macro, and Input Analysis","icon":"computer-mouse"}]},{"id":"ocs0Z71Hrv8BAsHrQNwJ","title":"Definition and Mouse Abuse","pathname":"/redlotusguide/screensharing-minecraft-knowledge/sixth-section-mouse-macro-and-input-analysis-in-screensharing/3-debounce-time-analysis/definition-and-mouse-abuse","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Mouse, Macro, and Input Analysis","icon":"computer-mouse"},{"label":"Debounce Time Analysis","icon":"hourglass-end"}]},{"id":"NOAzRDwvqaKr9b7HLYRx","title":"Server Rules Context","pathname":"/redlotusguide/screensharing-minecraft-knowledge/sixth-section-mouse-macro-and-input-analysis-in-screensharing/3-debounce-time-analysis/server-rules-context","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Mouse, Macro, and Input Analysis","icon":"computer-mouse"},{"label":"Debounce Time Analysis","icon":"hourglass-end"}]},{"id":"Dg35HVdtVqgH0NGsBnAr","title":"General Detection Strategy","pathname":"/redlotusguide/screensharing-minecraft-knowledge/sixth-section-mouse-macro-and-input-analysis-in-screensharing/3-debounce-time-analysis/general-detection-strategy","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Mouse, Macro, and Input Analysis","icon":"computer-mouse"},{"label":"Debounce Time Analysis","icon":"hourglass-end"}]},{"id":"3B9LhtTTqayG0F4kcGXh","title":"Detection by Mouse Brand","pathname":"/redlotusguide/screensharing-minecraft-knowledge/sixth-section-mouse-macro-and-input-analysis-in-screensharing/3-debounce-time-analysis/detection-by-mouse-brand","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenSharing Minecraft Knowledge"},{"label":"Mouse, Macro, and Input Analysis","icon":"computer-mouse"},{"label":"Debounce Time Analysis","icon":"hourglass-end"}]},{"id":"HB4c1kE6UpwBqVEnxOoA","title":"Program Execution","pathname":"/redlotusguide/advanced-explanation-of-artifacts/program-execution","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"badge-check","breadcrumbs":[{"label":"Advanced explanation of artifacts"}]},{"id":"G9HdmF5NMslQRYn0uCJA","title":"Prefetch","pathname":"/redlotusguide/advanced-explanation-of-artifacts/program-execution/prefetch","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"folder-open","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"Program Execution","icon":"badge-check"}]},{"id":"zTPFvadCav47Ew9IfjgK","title":"BAM & DAM","pathname":"/redlotusguide/advanced-explanation-of-artifacts/program-execution/bam-and-dam","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"sliders-simple","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"Program Execution","icon":"badge-check"}]},{"id":"ev7iLs14614wUVCpHbvm","title":"UserAssist","pathname":"/redlotusguide/advanced-explanation-of-artifacts/program-execution/userassist","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"user","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"Program Execution","icon":"badge-check"}]},{"id":"xOdxhirOX32wZOngS4iU","title":"Amcache / Syscache","pathname":"/redlotusguide/advanced-explanation-of-artifacts/program-execution/amcache-syscache","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"circle-question","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"Program Execution","icon":"badge-check"}]},{"id":"Xe2jltf0rgT139g2RBPb","title":"RecentFileCache","pathname":"/redlotusguide/advanced-explanation-of-artifacts/program-execution/recentfilecache","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"file-binary","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"Program Execution","icon":"badge-check"}]},{"id":"ajyGDAtvxU94ichm6JOv","title":"Activities Cache","pathname":"/redlotusguide/advanced-explanation-of-artifacts/program-execution/activities-cache","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"memo","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"Program Execution","icon":"badge-check"}]},{"id":"T2xa8eeF3esmMFWJUT8U","title":"System Resource Usage Monitor (SRUM)","pathname":"/redlotusguide/advanced-explanation-of-artifacts/program-execution/system-resource-usage-monitor-srum","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"server","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"Program Execution","icon":"badge-check"}]},{"id":"2NPFd2o7ppfROD6iZ9lK","title":"File System Activity","pathname":"/redlotusguide/advanced-explanation-of-artifacts/file-system-activity","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"grid-2","breadcrumbs":[{"label":"Advanced explanation of artifacts"}]},{"id":"mSO1P7fPMr23KBuHsEnL","title":"Master File Table","pathname":"/redlotusguide/advanced-explanation-of-artifacts/file-system-activity/master-file-table","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"folder-tree","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"File System Activity","icon":"grid-2"}]},{"id":"EUGEENT7nllk8T0z4GIW","title":"USN Journal ($UsnJrnl)","pathname":"/redlotusguide/advanced-explanation-of-artifacts/file-system-activity/usn-journal-usdusnjrnl","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"notebook","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"File System Activity","icon":"grid-2"}]},{"id":"gnX5l7ZyABoPhyhPpIdY","title":"$LogFile","pathname":"/redlotusguide/advanced-explanation-of-artifacts/file-system-activity/usdlogfile","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"file-waveform","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"File System Activity","icon":"grid-2"}]},{"id":"8hinIZ0bKCgqnATmdudo","title":"Recycle Bin ($Recycle.bin)","pathname":"/redlotusguide/advanced-explanation-of-artifacts/file-system-activity/recycle-bin-usdrecycle.bin","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"bin-recycle","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"File System Activity","icon":"grid-2"}]},{"id":"IytzVEJv2QttQvnLx57R","title":"Volume Shadow Copies (VSS)","pathname":"/redlotusguide/advanced-explanation-of-artifacts/file-system-activity/volume-shadow-copies-vss","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"clone","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"File System Activity","icon":"grid-2"}]},{"id":"KYg40Gkpjh5rwnJLkgqZ","title":"Index Attributes ($INDX / $i30)","pathname":"/redlotusguide/advanced-explanation-of-artifacts/file-system-activity/index-attributes-usdindx-usdi30","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"list-ul","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"File System Activity","icon":"grid-2"}]},{"id":"GCizzFCkvXbLflyZRREw","title":"Alternate Data Streams (ADS)","pathname":"/redlotusguide/advanced-explanation-of-artifacts/file-system-activity/alternate-data-streams-ads","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"file-plus","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"File System Activity","icon":"grid-2"}]},{"id":"rncULA2NrKeJSYaCw4xy","title":"User Activity and Knowledge","pathname":"/redlotusguide/advanced-explanation-of-artifacts/user-activity-and-knowledge","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"user-check","breadcrumbs":[{"label":"Advanced explanation of artifacts"}]},{"id":"Ro7uHIcqW1KErlwR3k3n","title":"Shellbags","pathname":"/redlotusguide/advanced-explanation-of-artifacts/user-activity-and-knowledge/shellbags","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"sack","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"User Activity and Knowledge","icon":"user-check"}]},{"id":"RRZzMLMNvZAPr9TNROAH","title":"PowerShell Command History","pathname":"/redlotusguide/advanced-explanation-of-artifacts/user-activity-and-knowledge/powershell-command-history","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"scroll-old","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"User Activity and Knowledge","icon":"user-check"}]},{"id":"doNpS6ZS1EXB6NQPKe48","title":"Temporary Files (%temp%)","pathname":"/redlotusguide/advanced-explanation-of-artifacts/user-activity-and-knowledge/temporary-files-temp","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"clock","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"User Activity and Knowledge","icon":"user-check"}]},{"id":"QNsZg7a9ITFCjcS0LGnq","title":"System Configuration and Persistence","pathname":"/redlotusguide/advanced-explanation-of-artifacts/system-configuration-and-persistence","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"gears","breadcrumbs":[{"label":"Advanced explanation of artifacts"}]},{"id":"edPMnpnAa2UJQbSoWmFl","title":"Registry","pathname":"/redlotusguide/advanced-explanation-of-artifacts/system-configuration-and-persistence/registry","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"bee","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"System Configuration and Persistence","icon":"gears"}]},{"id":"f1mCiJilbSs4Vzyyxku4","title":"Task Scheduler Artifact","pathname":"/redlotusguide/advanced-explanation-of-artifacts/system-configuration-and-persistence/task-scheduler-artifact","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"calendar-days","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"System Configuration and Persistence","icon":"gears"}]},{"id":"lQKwJGW6WLAPyuDaWIy6","title":"usb-drive","pathname":"/redlotusguide/advanced-explanation-of-artifacts/system-configuration-and-persistence/usb-drive","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"usb","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"System Configuration and Persistence","icon":"gears"}]},{"id":"3LcCrqdbHXq92t5JzkZX","title":"Windows Event Logs","pathname":"/redlotusguide/advanced-explanation-of-artifacts/system-configuration-and-persistence/windows-event-logs","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"list-tree","breadcrumbs":[{"label":"Advanced explanation of artifacts"},{"label":"System Configuration and Persistence","icon":"gears"}]},{"id":"zx4wXbz9x9kPXvpJcQj7","title":"RedLotus Tools","pathname":"/redlotusguide/screenshare-tools/redlotus-tools","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"toolbox","breadcrumbs":[{"label":"ScreenShare Tools"}]},{"id":"ZnUsqKOsIkp0azd1lkkj","title":"RedLotus Tool Downloader","pathname":"/redlotusguide/screenshare-tools/redlotus-tools/redlotus-tool-downloader","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"cloud-arrow-down","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"RedLotus Tools","icon":"toolbox"}]},{"id":"Uy9nbLHjnmgQus4J8XGo","title":"RedLotus Task Sentinel","pathname":"/redlotusguide/screenshare-tools/redlotus-tools/redlotus-task-sentinel","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"diagram-subtask","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"RedLotus Tools","icon":"toolbox"}]},{"id":"RcqFCs34lv8xazg7NnUS","title":"RedLotus Mod Analyzer","pathname":"/redlotusguide/screenshare-tools/redlotus-tools/redlotus-mod-analyzer","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"java","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"RedLotus Tools","icon":"toolbox"}]},{"id":"hg9UdY8kFW6Bgejm9DDB","title":"RedLotus Alt Checker","pathname":"/redlotusguide/screenshare-tools/redlotus-tools/redlotus-alt-checker","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"users","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"RedLotus Tools","icon":"toolbox"}]},{"id":"QjugdBZA2d5kpS8V8TTC","title":"Spok's Tools","pathname":"/redlotusguide/screenshare-tools/spoks-tools","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"toolbox","description":"","breadcrumbs":[{"label":"ScreenShare Tools"}]},{"id":"pp3Sc2YSmMjsvTPS97mH","title":"Paths Parser","pathname":"/redlotusguide/screenshare-tools/spoks-tools/paths-parser","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Spok's Tools","icon":"toolbox"}]},{"id":"6p6RPHTXrHlOSyZ6L7v7","title":"BAM parser","pathname":"/redlotusguide/screenshare-tools/spoks-tools/bam-parser","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Spok's Tools","icon":"toolbox"}]},{"id":"vUoFGSYUcYH3rL5B34Yd","title":"Prefetch Parser","pathname":"/redlotusguide/screenshare-tools/spoks-tools/prefetch-parser","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Spok's Tools","icon":"toolbox"}]},{"id":"cNczWPsY4g2r5TBh8N9z","title":"Kernel Live Dump Analyzer","pathname":"/redlotusguide/screenshare-tools/spoks-tools/kernel-live-dump-analyzer","siteSpaceId":"sitesp_uxDYW","lang":"en","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Spok's Tools","icon":"toolbox"}]},{"id":"fJfKPBcE4VS9AnRb820j","title":"Replaceparser","pathname":"/redlotusguide/screenshare-tools/spoks-tools/replaceparser","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Spok's Tools","icon":"toolbox"}]},{"id":"Y1VaPJS2WEU2zKVNDw6Y","title":"JournalTrace","pathname":"/redlotusguide/screenshare-tools/spoks-tools/journaltrace","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Spok's Tools","icon":"toolbox"}]},{"id":"BfuRqH8YcqK6K8ovNMcL","title":"pcasvc executed","pathname":"/redlotusguide/screenshare-tools/spoks-tools/pcasvc-executed","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Spok's Tools","icon":"toolbox"}]},{"id":"fdY4ZDcharOEgZ0oJxsq","title":"ActivitiesCache execution","pathname":"/redlotusguide/screenshare-tools/spoks-tools/activitiescache-execution","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Spok's Tools","icon":"toolbox"}]},{"id":"mjUSvsPz1cuMCUINJG5a","title":"process-parser","pathname":"/redlotusguide/screenshare-tools/spoks-tools/process-parser","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Spok's Tools","icon":"toolbox"}]},{"id":"hulmIeU2AzL6tJ3ZkyR8","title":"Spokwn Powershell Scripts","pathname":"/redlotusguide/screenshare-tools/spoks-tools/spokwn-powershell-scripts","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Spok's Tools","icon":"toolbox"}]},{"id":"3VoBhmyfmMogZRSyeRIP","title":"Streams Script","pathname":"/redlotusguide/screenshare-tools/spoks-tools/streams-script","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Spok's Tools","icon":"toolbox"}]},{"id":"HbizeOTGv9mMNwnfFrR6","title":"ActivitiesCache Script","pathname":"/redlotusguide/screenshare-tools/spoks-tools/activitiescache-script","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Spok's Tools","icon":"toolbox"}]},{"id":"rVsvA3EYXqnpvnG0mxY2","title":"Rancio's Tools","pathname":"/redlotusguide/screenshare-tools/rancios-tools","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"toolbox","description":"","breadcrumbs":[{"label":"ScreenShare Tools"}]},{"id":"ACD4k4h6ou7wrnGGawXb","title":"Tools","pathname":"/redlotusguide/screenshare-tools/rancios-tools/tools","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Rancio's Tools","icon":"toolbox"}]},{"id":"JWSde0f4vlYcYq8qg3JE","title":"Echo's Tools","pathname":"/redlotusguide/screenshare-tools/echos-tools","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"toolbox","description":"","breadcrumbs":[{"label":"ScreenShare Tools"}]},{"id":"mPSQSERUL9wB2nFJejOo","title":"Tools","pathname":"/redlotusguide/screenshare-tools/echos-tools/tools-mentioned","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Echo's Tools","icon":"toolbox"}]},{"id":"EHFEExRL2HKcG20qfKxI","title":"Specific PowerShell Scripts","pathname":"/redlotusguide/screenshare-tools/specific-powershell-scripts","siteSpaceId":"sitesp_uxDYW","lang":"en","icon":"square-code","description":"","breadcrumbs":[{"label":"ScreenShare Tools"}]},{"id":"hoimKgnFkmPjho60Dtqe","title":"Main RedLotus Scripts","pathname":"/redlotusguide/screenshare-tools/specific-powershell-scripts/key-categories-and-examples","siteSpaceId":"sitesp_uxDYW","lang":"en","description":"","breadcrumbs":[{"label":"ScreenShare Tools"},{"label":"Specific PowerShell Scripts","icon":"square-code"}]},{"id":"v15usdww95NTXk5lp9tC","title":"coming soon","pathname":"/redlotusguide/automatic-screenshare-tools/coming-soon","siteSpaceId":"sitesp_uxDYW","lang":"en","breadcrumbs":[{"label":"Automatic ScreenShare Tools"}]}]}