Home Page Icon
Home Page
Table of Contents for
Title Page
Close
Title Page
by Nick Furneaux
Investigating Cryptocurrencies
Cover
Foreword
Introduction
Cryptocurrencies: Coming to a Lab near You
Who Should Read This Book
About the Book's Web Resources
Part I: Understanding the Technology
CHAPTER 1: What Is a Cryptocurrency?
A New Concept?
Leading Currencies in the Field
Is Blockchain Technology Just for Cryptocurrencies?
Setting Yourself Up as a Bitcoin User
Summary
CHAPTER 2: The Hard Bit
Hashing
Public/Private Key Encryption
Building a Simple Cryptocurrency in the Lab
Summary
CHAPTER 3: Understanding the Blockchain
The Structure of a Block
Summary
CHAPTER 4: Transactions
The Concept behind a Transaction
The Mechanics of a Transaction
Extracting JSON Data
Analyzing Address History
Creating Vanity Addresses
Interpreting Ethereum Transactions
Summary
CHAPTER 5: Mining
The Proof-of-Work Concept
The Proof-of-Stake Concept
Mining Pools
Mining Fraud
Summary
CHAPTER 6: Wallets
Wallet Types
Why Is Recognizing Wallets Important?
The Wallet Import Format (WIF)
How Wallets Store Keys
Setting Up a Covert Wallet
Summary
CHAPTER 7: Contracts and Tokens
Contracts
Tokens and Initial Coin Offerings
Summary
Part II: Carrying Out Investigations
CHAPTER 8: Detecting the Use of Cryptocurrencies
The Premises Search
Searching Online
Extracting Private and Public Keys from Seized Computers
Working on a Live Computer
Summary
CHAPTER 9: Analysis of Recovered Addresses and Wallets
Finding Information on a Recovered Address
Analyzing a Recovered Wallet
Inferring Other Data
Summary
CHAPTER 10: Following the Money
Initial Hints and Tips
Transactions on Blockchain.info
Other Explorer Sites
Following Ethereum Transactions
Monitoring Addresses
Summary
CHAPTER 11: Visualization Systems
Online Blockchain Viewers
Commercial Visualization Systems
Summary
CHAPTER 12: Finding Your Suspect
Tracing an IP Address
Tracking to a Service Provider
Considering Open-Source Methods
Accessing and Searching the Dark Web
Detecting and Reading Micromessages
Summary
CHAPTER 13: Sniffing Cryptocurrency Traffic
What Is Intercept?
Watching a Bitcoin Node
Sniffing Data on the Wire
Summary
CHAPTER 14: Seizing Coins
Asset Seizure
Practice, Practice, Practice
Summary
CHAPTER 15: Putting It All Together
Examples of Cryptocurrency Crimes
What Have You Learned?
Where Do You Go from Here?
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index
Next
Next Chapter
Copyright
Investigating Cryptocurrencies
Understanding, Extracting, and Analyzing Blockchain Evidence
Nick Furneaux
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset