Muutke küpsiste eelistusi

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence [Pehme köide]

  • Formaat: Paperback / softback, 320 pages, kõrgus x laius x paksus: 234x185x20 mm, kaal: 454 g
  • Ilmumisaeg: 10-Aug-2018
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119480582
  • ISBN-13: 9781119480587
Teised raamatud teemal:
  • Pehme köide
  • Hind: 59,92 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 70,50 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 3-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Raamatukogudele
  • Formaat: Paperback / softback, 320 pages, kõrgus x laius x paksus: 234x185x20 mm, kaal: 454 g
  • Ilmumisaeg: 10-Aug-2018
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1119480582
  • ISBN-13: 9781119480587
Teised raamatud teemal:

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators.

Investigating Cryptocurrencies is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum.

  • Understand blockchain and transaction technologies  
  • Set up and run cryptocurrency accounts
  • Build information about specific addresses
  • Access raw data on blockchain ledgers
  • Identify users of cryptocurrencies
  • Extracting cryptocurrency data from live and imaged computers
  • Following the money

With nearly $150 billion in cryptocurrency circulating and $3 billion changing hands daily, crimes committed with or paid for with digital cash are a serious business. Luckily, Investigating Cryptocurrencies Forensics shows you how to detect it and, more importantly, stop it in its tracks.

Arvustused

"This book is smart, readable and scary too." (Irish Tech News, August 2018)

Foreword xxi
Introduction xxiii
Part I Understanding the Technology
1(116)
Chapter 1 What Is a Cryptocurrency?
3(12)
A New Concept?
3(5)
Leading Currencies in the Field
8(1)
Is Blockchain Technology Just for Cryptocurrencies?
9(1)
Setting Yourself Up as a Bitcoin User
10(4)
Summary
14(1)
Chapter 2 The Hard Bit
15(24)
Hashing
16(5)
Public/Private Key Encryption
21(11)
RSA Cryptography
23(5)
Elliptic Curve Cryptography
28(4)
Building a Simple Cryptocurrency in the Lab
32(4)
Summary
36(3)
Chapter 3 Understanding the Blockchain
39(28)
The Structure of a Block
40(25)
The Block Header
42(5)
Deconstructing Raw Blocks from Hex
47(4)
Applying This to the Downloaded Hex
51(4)
Number of Transactions
55(2)
Block Height
57(1)
Forks
58(3)
The Ethereum Block
61(4)
Summary
65(2)
Chapter 4 Transactions
67(20)
The Concept behind a Transaction
67(2)
The Mechanics of a Transaction
69(12)
Understanding the Mempool
76(1)
Understanding the ScriptSig and ScriptPubKey
77(2)
Interpreting Raw Transactions
79(2)
Extracting JSON Data
81(1)
Analyzing Address History
82(1)
Creating Vanity Addresses
83(2)
Interpreting Ethereum Transactions
85(1)
Summary
86(1)
Chapter 5 Mining
87(8)
The Proof-of-Work Concept
89(1)
The Proof-of-Stake Concept
90(1)
Mining Pools
90(2)
Mining Fraud
92(1)
Summary
93(2)
Chapter 6 Wallets
95(14)
Wallet Types
96(3)
Software Wallets
96(1)
Hardware Wallets
97(1)
Cold Wallets or Cold Storage
98(1)
Why Is Recognizing Wallets Important?
99(2)
Software Wallets
100(1)
Hardware Wallets
100(1)
Paper Wallets
100(1)
The Wallet Import Format (WIF)
101(1)
How Wallets Store Keys
102(3)
Setting Up a Covert Wallet
105(2)
Summary
107(2)
Chapter 7 Contracts and Tokens
109(8)
Contracts
109(3)
Bitcoin
110(1)
Ethereum
110(2)
Tokens and Initial Coin Offerings
112(4)
Summary
116(1)
Part II Carrying Out Investigations
117(158)
Chapter 8 Detecting the Use of Cryptocurrencies
119(28)
The Premises Search
120(5)
A New Category of Search Targets
121(3)
Questioning
124(1)
Searching Online
125(5)
Extracting Private and Public Keys from Seized Computers
130(7)
Commercial Tools
130(1)
Extracting the Wallet File
131(4)
Automating the Search for Bitcoin Addresses
135(1)
Finding Data in a Memory Dump
136(1)
Working on a Live Computer
137(8)
Acquiring the Wallet File
138(2)
Exporting Data from the Bitcoin Daemon
140(4)
Extracting Wallet Data from Live Linux and OSX Systems
144(1)
Summary
145(2)
Chapter 9 Analysis of Recovered Addresses and Wallets
147(28)
Finding Information on a Recovered Address
147(14)
Extracting Raw Data from Ethereum
154(1)
Searching for Information on a Specific Address
155(6)
Analyzing a Recovered Wallet
161(11)
Setting Up Your Investigation Environment
161(5)
Importing a Private Key
166(1)
Dealing with an Encrypted Wallet
167(5)
Inferring Other Data
172(1)
Summary
173(2)
Chapter 10 Following the Money
175(24)
Initial Hints and Tips
175(1)
Transactions on Blockchain.info
176(10)
Identifying Change Addresses
177(4)
Another Simple Method to Identify Clusters
181(1)
Moving from Transaction to Transaction
182(2)
Putting the Techniques Together
184(2)
Other Explorer Sites
186(3)
Following Ethereum Transactions
189(4)
Monitoring Addresses
193(4)
Blockonomics.co
193(1)
Bitnotify.com
194(1)
Writing Your Own Monitoring Script
194(2)
Monitoring Ethereum Addresses
196(1)
Summary
197(2)
Chapter 11 Visualization Systems
199(18)
Online Blockchain Viewers
199(15)
Blockchain.info
200(1)
Etherscan.io
201(13)
Commercial Visualization Systems
214(1)
Summary
215(2)
Chapter 12 Finding Your Suspect
217(28)
Tracing an IP Address
217(14)
Bitnodes
219(7)
Other Areas Where IPs Are Stored
226(2)
Is the Suspect Using Tor?
228(1)
Is the Suspect Using a Proxy or a VPN?
229(2)
Tracking to a Service Provider
231(4)
Considering Open-Source Methods
235(2)
Accessing and Searching the Dark Web
237(4)
Detecting and Reading Micromessages
241(3)
Summary
244(1)
Chapter 13 Sniffing Cryptocurrency Traffic
245(10)
What Is Intercept?
246(1)
Watching a Bitcoin Node
247(1)
Sniffing Data on the Wire
248(6)
Summary
254(1)
Chapter 14 Seizing Coins
255(12)
Asset Seizure
256(9)
Cashing Out
256(3)
Setting Up a Storage Wallet
259(2)
Importing a Suspect's Private Key
261(2)
Storage and Security
263(2)
Seizure from an Online Wallet
265(1)
Practice, Practice, Practice
265(1)
Summary
266(1)
Chapter 15 Putting It All Together
267(8)
Examples of Cryptocurrency Crimes
268(2)
Buying Illegal Goods
268(1)
Selling Illegal Goods
268(1)
Stealing Cryptocurrency
269(1)
Money Laundering
269(1)
Kidnap and Extortion
270(1)
What Have You Learned?
270(3)
Where Do You Go from Here?
273(2)
Index 275
NICK FURNEAUX is a cybersecurity and forensics consultant specializing in cybercrime prevention and investigation for law enforcement and corporations throughout the United States, Europe, and Asia. He regularly speaks at industry conferences, including the F3 (First Forensic Forum), NPCC/ACPO Hi-Tech Crime conference, European Network Forensics and Security conference, many others.