Details

Investigating Cryptocurrencies


Investigating Cryptocurrencies

Understanding, Extracting, and Analyzing Blockchain Evidence
1. Aufl.

von: Nick Furneaux

38,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 10.05.2018
ISBN/EAN: 9781119480570
Sprache: englisch
Anzahl Seiten: 320

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Investigate crimes involving cryptocurrencies and other blockchain technologies </b></p> <p>Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators.</p> <p><i>Investigating Cryptocurrencies </i>is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum.</p> <ul> <li>Understand blockchain and transaction technologies  </li> <li>Set up and run cryptocurrency accounts</li> <li>Build information about specific addresses</li> <li>Access raw data on blockchain ledgers</li> <li>Identify users of cryptocurrencies</li> <li>Extracting cryptocurrency data from live and imaged computers</li> <li>Following the money</li> </ul> <p>With nearly $150 billion in cryptocurrency circulating and $3 billion changing hands daily, crimes committed with or paid for with digital cash are a serious business. Luckily, <i>Investigating </i><i>Cryptocurrencies Forensics</i> shows you how to detect it and, more importantly, stop it in its tracks.</p>
<p>Foreword xxi</p> <p>Introduction xxiii</p> <p><b>Part I Understanding the Technology 1</b></p> <p><b>Chapter 1 What Is a Cryptocurrency? 3</b></p> <p>A New Concept? 3</p> <p>Leading Currencies in the Field 8</p> <p>Is Blockchain Technology Just for Cryptocurrencies? 9</p> <p>Setting Yourself Up as a Bitcoin User 10</p> <p>Summary 14</p> <p><b>Chapter 2 The Hard Bit 15</b></p> <p>Hashing 16</p> <p>Public/Private Key Encryption 21</p> <p>RSA Cryptography 23</p> <p>Elliptic Curve Cryptography 28</p> <p>Building a Simple Cryptocurrency in the Lab 32</p> <p>Summary 36</p> <p><b>Chapter 3 Understanding the Blockchain 39</b></p> <p>The Structure of a Block 40</p> <p>The Block Header 42</p> <p>Deconstructing Raw Blocks from Hex 47</p> <p>Applying This to the Downloaded Hex 51</p> <p>Number of Transactions 55</p> <p>Block Height 57</p> <p>Forks 58</p> <p>The Ethereum Block 61</p> <p>Summary 65</p> <p><b>Chapter 4 Transactions 67</b></p> <p>The Concept behind a Transaction 67</p> <p>The Mechanics of a Transaction 69</p> <p>Understanding the Mempool 76</p> <p>Understanding the ScriptSig and ScriptPubKey 77</p> <p>Interpreting Raw Transactions 79</p> <p>Extracting JSON Data 81</p> <p>Analyzing Address History 82</p> <p>Creating Vanity Addresses 83</p> <p>Interpreting Ethereum Transactions 85</p> <p>Summary 86</p> <p><b>Chapter 5 Mining 87</b></p> <p>The Proof-of-Work Concept 89</p> <p>The Proof-of-Stake Concept 90</p> <p>Mining Pools 90</p> <p>Mining Fraud 92</p> <p>Summary 93</p> <p><b>Chapter 6 Wallets 95</b></p> <p>Wallet Types 96</p> <p>Software Wallets 96</p> <p>Hardware Wallets 97</p> <p>Cold Wallets or Cold Storage 98</p> <p>Why Is Recognizing Wallets Important? 99</p> <p>Software Wallets 100</p> <p>Hardware Wallets 100</p> <p>Paper Wallets 100</p> <p>The Wallet Import Format (WIF) 101</p> <p>How Wallets Store Keys 102</p> <p>Setting Up a Covert Wallet 105</p> <p>Summary 107</p> <p><b>Chapter 7 Contracts and Tokens 109</b></p> <p>Contracts 109</p> <p>Bitcoin 110</p> <p>Ethereum 110</p> <p>Tokens and Initial Coin Offerings 112</p> <p>Summary 116</p> <p><b>Part II Carrying Out Investigations 117</b></p> <p><b>Chapter 8 Detecting the Use of Cryptocurrencies 119</b></p> <p>The Premises Search 120</p> <p>A New Category of Search Targets 121</p> <p>Questioning 124</p> <p>Searching Online 125</p> <p>Extracting Private and Public Keys from Seized Computers 130</p> <p>Commercial Tools 130</p> <p>Extracting the Wallet File 131</p> <p>Automating the Search for Bitcoin Addresses 135</p> <p>Finding Data in a Memory Dump 136</p> <p>Working on a Live Computer 137</p> <p>Acquiring the Wallet File 138</p> <p>Exporting Data from the Bitcoin Daemon 140</p> <p>Extracting Wallet Data from Live Linux and OSX Systems 144</p> <p>Summary 145</p> <p><b>Chapter 9 Analysis of Recovered Addresses and Wallets 147</b></p> <p>Finding Information on a Recovered Address 147</p> <p>Extracting Raw Data from Ethereum 154</p> <p>Searching for Information on a Specifi c Address 155</p> <p>Analyzing a Recovered Wallet 161</p> <p>Setting Up Your Investigation Environment 161</p> <p>Importing a Private Key 166</p> <p>Dealing with an Encrypted Wallet 167</p> <p>Inferring Other Data 172</p> <p>Summary 173</p> <p><b>Chapter 10 Following the Money 175</b></p> <p>Initial Hints and Tips 175</p> <p>Transactions on Blockchain.info 176</p> <p>Identifying Change Addresses 177</p> <p>Another Simple Method to Identify Clusters 181</p> <p>Moving from Transaction to Transaction 182</p> <p>Putting the Techniques Together 184</p> <p>Other Explorer Sites 186</p> <p>Following Ethereum Transactions 189</p> <p>Monitoring Addresses 193</p> <p>Blockonomics.co 193</p> <p>Bitnotify.com 194</p> <p>Writing Your Own Monitoring Script 194</p> <p>Monitoring Ethereum Addresses 196</p> <p>Summary 197</p> <p><b>Chapter 11 Visualization Systems 199</b></p> <p>Online Blockchain Viewers 199</p> <p>Blockchain.info 200</p> <p>Etherscan.io 201</p> <p>Commercial Visualization Systems 214</p> <p>Summary 215</p> <p><b>Chapter 12 Finding Your Suspect 217</b></p> <p>Tracing an IP Address 217</p> <p>Bitnodes 219</p> <p>Other Areas Where IPs Are Stored 226</p> <p>Is the Suspect Using Tor? 228</p> <p>Is the Suspect Using a Proxy or a VPN? 229</p> <p>Tracking to a Service Provider 231</p> <p>Considering Open-Source Methods 235</p> <p>Accessing and Searching the Dark Web 237</p> <p>Detecting and Reading Micromessages 241</p> <p>Summary 244</p> <p><b>Chapter 13 Sniffi ng Cryptocurrency Traffi c 245</b></p> <p>What Is Intercept? 246</p> <p>Watching a Bitcoin Node 247</p> <p>Sniffi ng Data on the Wire 248</p> <p>Summary 254</p> <p><b>Chapter 14 Seizing Coins 255</b></p> <p>Asset Seizure 256</p> <p>Cashing Out 256</p> <p>Setting Up a Storage Wallet 259</p> <p>Importing a Suspect’s Private Key 261</p> <p>Storage and Security 263</p> <p>Seizure from an Online Wallet 265</p> <p>Practice, Practice, Practice 265</p> <p>Summary 266</p> <p><b>Chapter 15 Putting It All Together 267</b></p> <p>Examples of Cryptocurrency Crimes 268</p> <p>Buying Illegal Goods 268</p> <p>Selling Illegal Goods 268</p> <p>Stealing Cryptocurrency 269</p> <p>Money Laundering 269</p> <p>Kidnap and Extortion 270</p> <p>What Have You Learned? 270</p> <p>Where Do You Go from Here? 273</p> <p>Index 275</p>
<p><b>NICK FURNEAUX</b> is a cybersecurity and forensics consultant specializing in cybercrime prevention and investigation for law enforcement and corporations throughout the United States, Europe, and Asia. He regularly speaks at industry conferences, including the F3 (First Forensic Forum), NPCC/ACPO Hi-Tech Crime conference, European Network Forensics and Security conference, many others.
<p><b>An Essential Guide to the Tools and Techniques of Cryptocurrency Forensics</b> <p>Cryptocurrency is exploding in popularity. Once relegated to the Dark Web and used primarily for illicit activities, virtual currencies such as Bitcoin and Ethereum are now being used as investments and in more mainstream transactions. As major banks keep close watch, these currencies are gaining ground, with all signs pointing toward expansion in use and accessibility. There is currently $150 billion in circulating cryptocurrency, with $3 billion changing hands daily—yet none of this can be traced by normal means. <i>Investigating Cryptocurrencies</i> provides cyber and financial investigators with the necessary background, techniques, and methodologies to break through the blockchain "lockdown" and investigate crimes involving cryptocurrency transactions. <p>Globally recognized cybersecurity and forensics expert Nick Furneaux demystifies blockchain technology and gives investigators who are entering this new playing field practical guidance. By linking the familiar investigative workflow with essential tools and techniques that are specific to cryptocurrency forensics, Furneaux has compiled a complete playbook for all major stages of an investigation. Topics discussed in this book include cryptocurrency detection, blockchain visualization, address and transaction extraction, micromessage detection, and much more. Real-world tools and techniques give readers insight into the practices used by criminals. With cryptocurrencies rapidly advancing into the mainstream and bringing outside crime into the cybersecurity realm, this book provides the critical information that forensics professionals will need to remain effective as currency moves online. <p>With step-by-step instruction bolstered by in-depth explanations and expert perspective, Investigating Cryptocurrencies will help you: <ul> <li>Develop a deeper understanding of blockchain and transaction technologies</li> <li>Set up and run a cryptocurrency account</li> <li>Access raw data on blockchain ledgers</li> <li>Track transactions and build information on specific addresses</li> <li>Identify the real-world users behind a transaction</li> <li>Understand "coin" seizure methodology</li> <li>Use appropriate technology and techniques during investigations</li> </ul>

Diese Produkte könnten Sie auch interessieren:

MDX Solutions
MDX Solutions
von: George Spofford, Sivakumar Harinath, Christopher Webb, Dylan Hai Huang, Francesco Civardi
Preis: 53,99 €
Concept Data Analysis
Concept Data Analysis
von: Claudio Carpineto, Giovanni Romano
Preis: 107,99 €
Handbook of Virtual Humans
Handbook of Virtual Humans
von: Nadia Magnenat-Thalmann, Daniel Thalmann
Preis: 150,99 €