| Foreword |
|
xxi | |
| Introduction |
|
xxiii | |
|
Part I Understanding the Technology |
|
|
1 | (116) |
|
Chapter 1 What Is a Cryptocurrency? |
|
|
3 | (12) |
|
|
|
3 | (5) |
|
Leading Currencies in the Field |
|
|
8 | (1) |
|
Is Blockchain Technology Just for Cryptocurrencies? |
|
|
9 | (1) |
|
Setting Yourself Up as a Bitcoin User |
|
|
10 | (4) |
|
|
|
14 | (1) |
|
|
|
15 | (24) |
|
|
|
16 | (5) |
|
Public/Private Key Encryption |
|
|
21 | (11) |
|
|
|
23 | (5) |
|
Elliptic Curve Cryptography |
|
|
28 | (4) |
|
Building a Simple Cryptocurrency in the Lab |
|
|
32 | (4) |
|
|
|
36 | (3) |
|
Chapter 3 Understanding the Blockchain |
|
|
39 | (28) |
|
|
|
40 | (25) |
|
|
|
42 | (5) |
|
Deconstructing Raw Blocks from Hex |
|
|
47 | (4) |
|
Applying This to the Downloaded Hex |
|
|
51 | (4) |
|
|
|
55 | (2) |
|
|
|
57 | (1) |
|
|
|
58 | (3) |
|
|
|
61 | (4) |
|
|
|
65 | (2) |
|
|
|
67 | (20) |
|
The Concept behind a Transaction |
|
|
67 | (2) |
|
The Mechanics of a Transaction |
|
|
69 | (12) |
|
Understanding the Mempool |
|
|
76 | (1) |
|
Understanding the ScriptSig and ScriptPubKey |
|
|
77 | (2) |
|
Interpreting Raw Transactions |
|
|
79 | (2) |
|
|
|
81 | (1) |
|
Analyzing Address History |
|
|
82 | (1) |
|
Creating Vanity Addresses |
|
|
83 | (2) |
|
Interpreting Ethereum Transactions |
|
|
85 | (1) |
|
|
|
86 | (1) |
|
|
|
87 | (8) |
|
The Proof-of-Work Concept |
|
|
89 | (1) |
|
The Proof-of-Stake Concept |
|
|
90 | (1) |
|
|
|
90 | (2) |
|
|
|
92 | (1) |
|
|
|
93 | (2) |
|
|
|
95 | (14) |
|
|
|
96 | (3) |
|
|
|
96 | (1) |
|
|
|
97 | (1) |
|
Cold Wallets or Cold Storage |
|
|
98 | (1) |
|
Why Is Recognizing Wallets Important? |
|
|
99 | (2) |
|
|
|
100 | (1) |
|
|
|
100 | (1) |
|
|
|
100 | (1) |
|
The Wallet Import Format (WIF) |
|
|
101 | (1) |
|
|
|
102 | (3) |
|
Setting Up a Covert Wallet |
|
|
105 | (2) |
|
|
|
107 | (2) |
|
Chapter 7 Contracts and Tokens |
|
|
109 | (8) |
|
|
|
109 | (3) |
|
|
|
110 | (1) |
|
|
|
110 | (2) |
|
Tokens and Initial Coin Offerings |
|
|
112 | (4) |
|
|
|
116 | (1) |
|
Part II Carrying Out Investigations |
|
|
117 | (158) |
|
Chapter 8 Detecting the Use of Cryptocurrencies |
|
|
119 | (28) |
|
|
|
120 | (5) |
|
A New Category of Search Targets |
|
|
121 | (3) |
|
|
|
124 | (1) |
|
|
|
125 | (5) |
|
Extracting Private and Public Keys from Seized Computers |
|
|
130 | (7) |
|
|
|
130 | (1) |
|
Extracting the Wallet File |
|
|
131 | (4) |
|
Automating the Search for Bitcoin Addresses |
|
|
135 | (1) |
|
Finding Data in a Memory Dump |
|
|
136 | (1) |
|
Working on a Live Computer |
|
|
137 | (8) |
|
Acquiring the Wallet File |
|
|
138 | (2) |
|
Exporting Data from the Bitcoin Daemon |
|
|
140 | (4) |
|
Extracting Wallet Data from Live Linux and OSX Systems |
|
|
144 | (1) |
|
|
|
145 | (2) |
|
Chapter 9 Analysis of Recovered Addresses and Wallets |
|
|
147 | (28) |
|
Finding Information on a Recovered Address |
|
|
147 | (14) |
|
Extracting Raw Data from Ethereum |
|
|
154 | (1) |
|
Searching for Information on a Specific Address |
|
|
155 | (6) |
|
Analyzing a Recovered Wallet |
|
|
161 | (11) |
|
Setting Up Your Investigation Environment |
|
|
161 | (5) |
|
|
|
166 | (1) |
|
Dealing with an Encrypted Wallet |
|
|
167 | (5) |
|
|
|
172 | (1) |
|
|
|
173 | (2) |
|
Chapter 10 Following the Money |
|
|
175 | (24) |
|
|
|
175 | (1) |
|
Transactions on Blockchain.info |
|
|
176 | (10) |
|
Identifying Change Addresses |
|
|
177 | (4) |
|
Another Simple Method to Identify Clusters |
|
|
181 | (1) |
|
Moving from Transaction to Transaction |
|
|
182 | (2) |
|
Putting the Techniques Together |
|
|
184 | (2) |
|
|
|
186 | (3) |
|
Following Ethereum Transactions |
|
|
189 | (4) |
|
|
|
193 | (4) |
|
|
|
193 | (1) |
|
|
|
194 | (1) |
|
Writing Your Own Monitoring Script |
|
|
194 | (2) |
|
Monitoring Ethereum Addresses |
|
|
196 | (1) |
|
|
|
197 | (2) |
|
Chapter 11 Visualization Systems |
|
|
199 | (18) |
|
Online Blockchain Viewers |
|
|
199 | (15) |
|
|
|
200 | (1) |
|
|
|
201 | (13) |
|
Commercial Visualization Systems |
|
|
214 | (1) |
|
|
|
215 | (2) |
|
Chapter 12 Finding Your Suspect |
|
|
217 | (28) |
|
|
|
217 | (14) |
|
|
|
219 | (7) |
|
Other Areas Where IPs Are Stored |
|
|
226 | (2) |
|
Is the Suspect Using Tor? |
|
|
228 | (1) |
|
Is the Suspect Using a Proxy or a VPN? |
|
|
229 | (2) |
|
Tracking to a Service Provider |
|
|
231 | (4) |
|
Considering Open-Source Methods |
|
|
235 | (2) |
|
Accessing and Searching the Dark Web |
|
|
237 | (4) |
|
Detecting and Reading Micromessages |
|
|
241 | (3) |
|
|
|
244 | (1) |
|
Chapter 13 Sniffing Cryptocurrency Traffic |
|
|
245 | (10) |
|
|
|
246 | (1) |
|
|
|
247 | (1) |
|
Sniffing Data on the Wire |
|
|
248 | (6) |
|
|
|
254 | (1) |
|
|
|
255 | (12) |
|
|
|
256 | (9) |
|
|
|
256 | (3) |
|
Setting Up a Storage Wallet |
|
|
259 | (2) |
|
Importing a Suspect's Private Key |
|
|
261 | (2) |
|
|
|
263 | (2) |
|
Seizure from an Online Wallet |
|
|
265 | (1) |
|
Practice, Practice, Practice |
|
|
265 | (1) |
|
|
|
266 | (1) |
|
Chapter 15 Putting It All Together |
|
|
267 | (8) |
|
Examples of Cryptocurrency Crimes |
|
|
268 | (2) |
|
|
|
268 | (1) |
|
|
|
268 | (1) |
|
|
|
269 | (1) |
|
|
|
269 | (1) |
|
|
|
270 | (1) |
|
|
|
270 | (3) |
|
Where Do You Go from Here? |
|
|
273 | (2) |
| Index |
|
275 | |