Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Table of Contents
Foreword
Introduction
Cryptocurrencies: Coming to a Lab near You
Who Should Read This Book
About the Book's Web Resources
Part I: Understanding the Technology
CHAPTER 1: What Is a Cryptocurrency?
A New Concept?
Leading Currencies in the Field
Is Blockchain Technology Just for Cryptocurrencies?
Setting Yourself Up as a Bitcoin User
Summary
CHAPTER 2: The Hard Bit
Hashing
Public/Private Key Encryption
Building a Simple Cryptocurrency in the Lab
Summary
CHAPTER 3: Understanding the Blockchain
The Structure of a Block
Summary
CHAPTER 4: Transactions
The Concept behind a Transaction
The Mechanics of a Transaction
Extracting JSON Data
Analyzing Address History
Creating Vanity Addresses
Interpreting Ethereum Transactions
Summary
CHAPTER 5: Mining
The Proof-of-Work Concept
The Proof-of-Stake Concept
Mining Pools
Mining Fraud
Summary
CHAPTER 6: Wallets
Wallet Types
Why Is Recognizing Wallets Important?
The Wallet Import Format (WIF)
How Wallets Store Keys
Setting Up a Covert Wallet
Summary
CHAPTER 7: Contracts and Tokens
Contracts
Tokens and Initial Coin Offerings
Summary
Part II: Carrying Out Investigations
CHAPTER 8: Detecting the Use of Cryptocurrencies
The Premises Search
Searching Online
Extracting Private and Public Keys from Seized Computers
Working on a Live Computer
Summary
CHAPTER 9: Analysis of Recovered Addresses and Wallets
Finding Information on a Recovered Address
Analyzing a Recovered Wallet
Inferring Other Data
Summary
CHAPTER 10: Following the Money
Initial Hints and Tips
Transactions on Blockchain.info
Other Explorer Sites
Following Ethereum Transactions
Monitoring Addresses
Summary
CHAPTER 11: Visualization Systems
Online Blockchain Viewers
Commercial Visualization Systems
Summary
CHAPTER 12: Finding Your Suspect
Tracing an IP Address
Tracking to a Service Provider
Considering Open-Source Methods
Accessing and Searching the Dark Web
Detecting and Reading Micromessages
Summary
CHAPTER 13: Sniffing Cryptocurrency Traffic
What Is Intercept?
Watching a Bitcoin Node
Sniffing Data on the Wire
Summary
CHAPTER 14: Seizing Coins
Asset Seizure
Practice, Practice, Practice
Summary
CHAPTER 15: Putting It All Together
Examples of Cryptocurrency Crimes
What Have You Learned?
Where Do You Go from Here?
Index
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →