- Monappa K.A., "Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware".
- Sikorski M., Honig A., "Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software".
- Ferrie P., "The "Ultimate" Anti-Debugging Reference".
- Hale L.M., Adair S., Hartstein B., Richard M., "Malware Analyst’s Cookbook".
- Koret J., Bachaalany E., The Antivirus Hacker's Handbook.
- [Hanel A., "The Beginner's Guide to IDAPython"](https://leanpub.
|int hexdump(FILE *fd, void const *ptr, size_t length, int linelen, int split);|
|char buffer = "0123456789ABCDEFabcdef0123456789AAAABBBBCCCCDDDDHello World\rTest-line\n";|
|@echo on & @setlocal enableextensions|
|@echo Turn off the time service|
|net stop w32time|
|@echo Set the SNTP (Simple Network Time Protocol) source for the time server|
|w32tm /config /syncfromflags:manual /manualpeerlist:"0.it.pool.ntp.org 1.it.pool.ntp.org 2.it.pool.ntp.org 3.it.pool.ntp.org"|
|@echo ... and then turn on the time service back on|
|net start w32time|
There is an increasing count of applications which use Authy for two-factor authentication. However many users who aren't using Authy, have their own authenticator setup up already and do not wish to use two applications for generating passwords.
Since I use 1Password for all of my password storing/generating needs, I was looking for a solution to use Authy passwords on that. I couldn't find any completely working solutions, however I stumbled upon a gist by Brian Hartvigsen. His post had a neat code with it to generate QR codes for you to use on your favorite authenticator.
His method is to extract the secret keys using Authy's Google Chrome app via Developer Tools. If this was not possible, I guess people would be reverse engineering the Android app or something like that. But when I tried that code, nothing appeared on the screen. My guess is that Brian used the