SlideShare a Scribd company logo
1 of 135
Image Source : lucknowbytes.com
The views expressed in this
presentation are Mere Apne.
Reference to any specific products,
process ,or service do not
necessarily constitute or imply
endorsement, recommendation, or
views of Min of Def or any Govt
All images used are for illustrative
purposes only & Do not
promote any specific product
This PRESENTATION is not going to
make anyone of you a
BITCOIN FORENSIC EXPERT
INVESTIGATOR
BUT may only LEND you few TERMS
OF REFERENCES to build upon and
EXPLORE further
Presented by
Anupam Tiwari
Paap se Dharti phati-phati-phati, Adharm
se aasmaan,
Atyachaar se kaanpi Insaaniyat,
Raj kar rahe Haivaan ...
Jinki hogi taqat apoorv,
Jinka hoga nishana abhed,
Joh karenge inka sarvanaash ...
………….woh kehlayenge Tridev
Name used by the
unknown person who
designed BITCOIN
and created its
original reference
implementation
SATOSHI
NAKAMOTO
कह ाँ गय ,उसे ढूंढो
AS OF 07TH OCT 2017
1 BITCOIN IS WORTH
4356 $
SO 1 BITCOIN IS
2,85,079/-
SOURCE : https://blockchain.info/charts/n-transactions
2 6 0 4 3 7
SOURCE : https://blockchain.info/charts/n-transactions
ANONYMITY
VS
PSEUDONYMITY
Mark TwainSamuel Clemens
public key addresses similar in function to an
email address, are used to send and receive
Bitcoins and record transactions, as opposed
to personally identifying information.
CRYPTOCURRENCY IS AN ATTEMPT
TO BRING BACK A DECENTRALISED
CURRENCY OF PEOPLE, ONE THAT IS NOT
SUBJECT TO INFLATIONARY MOVES BY
A CENTRAL BANK
Bitcoin is starting to come
into its own as a Digital
Currency, but the Blockchain
Technology behind it could
prove to be much more
SIGNIFICANT
More DETAILS a Forensic
Investigator KNOWS about the TECH
ARCHITECTURE, the CLOSER
he gets to CLOSE the CASE
BASICALLY CHUNKS OF INFO
THAT CAN BE USED TO
MATHEMATICAL
GUARANTEE ABOUT MESSAGES
Peer-to-
Peer (P2P)
network is
created when
two or
more PCs are
connected &
share
resources
without
going through a
separate
server
computer
Distributed Ledger is a Consensus of
Replicated, Shared & Synchronized
digital data geographically spread across
multiple sites & countries
Type of Distributed Ledger, comprised
of Unchangeable, Digitally
Recorded Data in packages called
BLOCKS
TAMPER EVIDENT LEDGER
MERKLE TREE
Linked list data structure, with
each block containing a
hash of the previous block
Proof Of Work Is A Piece Of Data
Which Is Difficult To Produce But
Easy For Others To Verify And Which
Satisfies Certain Requirements
Bitcoin Uses
The Hashcash Proof
Of Work System.
PROOF OF WORK
Each block is formed by a proof-of-
work algorithms, through which
consensus of this distributed
system could be obtained via the
longest possible chain
https://anders.com/blockchain/blockchain.html
Thus blockchain provides
the basis for the TRUSTLESS
DISTRIBUTED SYSTEM
A block is an aggregated set of data
Data is collected and
processed to fit in a block
through a process called
MINING
Each block could be identified using
a Cryptographic Hash
Mining is the process
of writing pages
(blocks) of Bitcoin
transactions into the
‘The Bitcoin
Blockchain’, and
getting rewarded with
newly created bitcoins
Block will contain a hash
of the previous block, so
that blocks can form a
chain from the first block
ever (known as the
Genesis Block) to the
formed block
FIRST BLOCK : GENESIS
Every 10 minutes, all Bitcoin
transactions taking place are bundled
into a block
These blocks linked through a
timestamp signing, form a
chain (blockchain), which goes
back to the first block ever
created (mined)
The time stamping makes it
impossible to alter any part of it
once the network confirms it
These rules are inbuilt in the
Bitcoin core software, which
every node in the Bitcoin
network runs
Before a new block is added to the
blockchain, the Bitcoin network
has to reach a consensus on
based on predetermined rules
Data in a blockchain is
internally consistent
and immutable
Each block’s hash is
derived from the
contents of the block
Each block refers to
the previous block’s hash,
not a sequential number
THE LAST BITCOIN
(PROBABLY 21 MILLIONTH COIN)
WILL BE MINED IN THE YEAR
2140
“शरीर में 206 हड्डिय ां
है, और सांविध न में
1670 क नून ... हड्िी
से लेकर क नून सब
तोड़त हूूँ….”
SHA तोड़
के दिखा….
BITCOIN MINING
A reward system, in
the form of
a website or app, that
dispenses rewards in
the form of a satoshi,
for visitors to claim in
exchange for
completing
a captcha or task as
described by the
website.
SATOSHI : 1/100th of a Millionth BITCOIN
A user for CONDUCTING
TRANSACTIONS utilizing BITCOIN,
he or she must first DOWNLOAD and
setup a BITCOIN WALLET
BITCOIN WALLET can show the
total BALANCE of all BITCOINS it
CONTROLS and let A USER PAY a
specified AMOUNT
WALLET contains a USER’S
PRIVATE KEY, which ALLOWS
FOR THE SPENDING of the
BITCOINS, which are located in
the BLOCK CHAIN
Once wallet is INSTALLED &
CONFIGURED, an ADDRESS
is GENERATED which is
SIMILAR to an E-MAIL or
PHYSICAL ADDRESS
WALLET is basically
the Bitcoin Equivalent
of a Bank account.
Allows to RECEIVE BITCOINS,
them, and then
SEND them to others
Connected to the Internet
or is online is said to be HOT
Cold Wallets & Hot Wallets
Cold is considered
most Secure &
suitable for Storing
Large Amounts of
bitcoins
Hot is suitable for
Frequently
Accessed funds
COLD implies it is Offline or
Disconnected from the
Internet
Designedto be downloaded
& used on Laptops/PCs
DESKTOPWALLETS
Armory, Multibit, Msigna
and Hiveto mention a FEW
Easyto Access.
Available for Different OS
– Windows, Mac OS and Ubuntu.
MOBILEWALLETS
ONLINEWEBWALLETS
PHYSICALWALLETS
Once they are generated, you
print them out on a piece of
paper
Paper Wallets can
Securely hold your BITCOINS
in Cold Storage form for a
long time
Bitaddress.org
or Blockchain.info
BitcoinQt is the First ever built
bitcoin CLIENT WALLET
BITCOINCLIENTS
WALLETS
Original bitcoin
wallet used by the
Pioneers of the
currency
COMPUTERS installed with these wallets
FORM PART OF THE CORE
NETWORK & have access to all
transactions on the blockchain
HARDWAREWALLETS
BITCOIN ARTIFACTS
They DON’T EXIST
ANYWHERE, even
on a hard drive
When we say SOMEONE HAS
BITCOINS & you look at a
PARTICULAR BITCOIN ADDRESS,
there are NO DIGITAL BITCOINS held
AGAINST that ADDRESS
BALANCE of any BITCOIN
address ISN’T HELD at that
ADDRESS; one MUST
RECONSTRUCT it by looking at
the BLOCKCHAIN
Everyone on the NETWORK knows about a
TRANSACTION and THE HISTORY
OF A TRANSACTION can be TRACED
BACK to the point where the BITCOINS
were produced
Conduct a
SEARCH based
on BLOCK
NUMBER,
ADDRESS,
BLOCK HASH,
TRANSACTION
HASH or
PUBLIC KEY
SOURCE : https://blockchain.info/ip-log
LOCK FILE
DEBUG.LOG
PEERS.DAT
WALLET.DAT
BITCOIN-QT FOLDER STRUCTURE
DB LOCK FILE
EXTENSIVE LOGGING
FILE
PEER INFORMATION
STORAGE FOR
KEYS,TXN,METADATA
etc
BITCOIN-QT FOLDER STRUCTURE
BITCOIN-BLOCK FOLDER ANALYSIS
BITCOIN-QT FOLDER STRUCTURE
Blocks – This subdirectory contains
blockchain data and contains a
“blk.dat” file and a “blocks/index”
subdirectory
“blk.dat” stores actual Bitcoin
blocks dumped in raw format
The “blocks/index subdirectory” is a
database that contains metadata
about all known blocks
Chainstate subdirectory- it is a
database with a compact
representation of all currently unspent
transactions and some metadata about
where the transactions originated
BITCOIN-QT FOLDER STRUCTURE
Database subdirectory -
Contains database journaling
files
BITCOIN-QT FOLDER STRUCTURE
1.46 × 10^48 possible
Bitcoin Addresses
that gives every
person on Earth
2.05×10^38 Different
Addresses
Bitcoin Mixer is an Anonymous
Service, that confuses the trails
of Bitcoin transactions.
PROJECT TITANIUM : Main thrust of the European
Union’s Titanium Project is to Monitor blockchains,
deanonymize wallet addresses, surveil dark net
markets, and block terrorists and money launderers.
TITANIUM, which stands for Tools for the Investigation of
Transactions in Underground Markets
Private key of the suspect, they can
search for that particular key on the
Blockchain to Trace the purchases
to other potential Suspects.
investigator has the Bitcoin
Detecting such attackers is CHALLENGING
any day
Attacking Bitcoin via the Internet
infrastructure using routing attacks
As Bitcoin connections are routed over the
Internet—in clear text and without
integrity checks—any third-party can
eavesdrop, drop, modify, inject, or
delay Bitcoin messages
BITCOIN FORENSIC ARTIFACT EXAMINATION
Windows 7 Professional
Multibit
Bitcoin-Qt
Bitminter
Basic USB ASIC Bitcoin
Gateway laptop ML6720
120 GB WD hard drive
(4) USB ASIC Mining
drives
USB powered cooling fan
32 GB USB thumb drive
• System Info
• Info about Logged users
• Registry Info
• Remnants of Chats
• Web browsing Activities
• Recent Communications
• Info from Cloud Services
• Decryption Keys for encrypted
volumes mounted
COLLECTION OF BITCOIN ARTIFACTS
Utilizing the data from
344
transactions,
Meiklejohn able to
identify the owners of
more than a million
Bitcoin addresses
Sarah Meiklejohn, a Bitcoin focused
Computer Researcher
Extensive Research
in
Bitcoin Blockchain
Found that by looking
blockchain an
investigator can
uncover who owns a
Bitcoin addresses
2015
“In this paper we show that combining TOR and
BITCOIN creates an ATTACK VECTOR for the
stealthy man-in-the-middle attacks. A LOW-
RESOURCE ATTACKER gain FULL
CONTROL of information flows between all users
who chose to use Bitcoin over TOR. In particular the
attacker CAN LINK TOGETHER USER’S
TRANSACTIONS regardless of pseudonyms used”
Bitcoin transactions occur via a
Network Connection, an investigator
should seize any Physical Object that
can connect to the Internet in addition
to the hard drive
COLLECTION OF BITCOIN ARTIFACTS
Ulbricht
Ross
anupamtiwari@protonmail.com
https://about.me/anupam.tiwari
Source : Alex Biryuk et al., Deanonymisation of Clients in Bitcoin P2P
Network
Bitcoin network is composed of
PEERS connected to others PEERS
over unencrypted TCP channels
Each peer attempts to
maintain EIGHT outgoing
connections to other peers
These eight peers are called
ENTRY NODES
Transaction and Block messages
are propagated in network by being
Relayed through these ENTRY NODES
to other peers
When X sends a transaction advertising
that he is transferring ownership of 1 BTC
to Y, his computer sends an inv message
to its immediate peers, the entry nodes
The inv message lets the entry
nodes know that there are
transactions or blocks
Entry nodes relay the data
farther throughout the network by
sending inv to their own peers
Entry nodes request full
transaction by sending
getdata response to X’s
computer
SMART CONTRACTS are computer protocols
that facilitate, verify, or enforce the negotiation
or performance of a CONTRACT, or that make a
contractual clause unnecessary. Smart
contracts often EMULATE the logic of
contractual clauses.
"A system condition in which system
resources are free from unauthorized access
and from unauthorized or accidental change,
destruction, or loss."
तकनीकी शब्िावली
बिटकॉइन
Number of
blocks preceding
particular block
on a block chain.
Genesis block has a height of zero
because zero block preceded it.
How difficult it is to find
a block relative to
the difficulty of finding the easiest
possible block. The easiest
possible block has a proof-of-
work difficulty of 1.
Difficulty is changed every
2016 blocks based on the time
it took to discover 2016
previous blocks.

More Related Content

What's hot

Introduction to Bitcoin for programmers
Introduction to Bitcoin for programmersIntroduction to Bitcoin for programmers
Introduction to Bitcoin for programmersWojciech Langiewicz
 
Bitcoin for programmers - part 1 version 2
Bitcoin for programmers - part 1 version 2Bitcoin for programmers - part 1 version 2
Bitcoin for programmers - part 1 version 2Wojciech Langiewicz
 
Bitcoin 101 from Tianfang Guo @ JayWSalon
Bitcoin 101 from Tianfang Guo @ JayWSalonBitcoin 101 from Tianfang Guo @ JayWSalon
Bitcoin 101 from Tianfang Guo @ JayWSalonTom Ding
 
EXPLAINING BITCOIN TO THE MASSES: A GLASS BOX ANALOGY
EXPLAINING BITCOIN TO THE MASSES: A GLASS BOX ANALOGYEXPLAINING BITCOIN TO THE MASSES: A GLASS BOX ANALOGY
EXPLAINING BITCOIN TO THE MASSES: A GLASS BOX ANALOGYSteven Rhyner
 
HOW DO BITCOIN TRANSACTIONS WORK?
HOW DO BITCOIN TRANSACTIONS WORK?HOW DO BITCOIN TRANSACTIONS WORK?
HOW DO BITCOIN TRANSACTIONS WORK?Steven Rhyner
 

What's hot (6)

Introduction to Bitcoin for programmers
Introduction to Bitcoin for programmersIntroduction to Bitcoin for programmers
Introduction to Bitcoin for programmers
 
Bitcoin for programmers - part 1 version 2
Bitcoin for programmers - part 1 version 2Bitcoin for programmers - part 1 version 2
Bitcoin for programmers - part 1 version 2
 
Bitcoin 101 from Tianfang Guo @ JayWSalon
Bitcoin 101 from Tianfang Guo @ JayWSalonBitcoin 101 from Tianfang Guo @ JayWSalon
Bitcoin 101 from Tianfang Guo @ JayWSalon
 
Intro to blockchain
Intro to blockchainIntro to blockchain
Intro to blockchain
 
EXPLAINING BITCOIN TO THE MASSES: A GLASS BOX ANALOGY
EXPLAINING BITCOIN TO THE MASSES: A GLASS BOX ANALOGYEXPLAINING BITCOIN TO THE MASSES: A GLASS BOX ANALOGY
EXPLAINING BITCOIN TO THE MASSES: A GLASS BOX ANALOGY
 
HOW DO BITCOIN TRANSACTIONS WORK?
HOW DO BITCOIN TRANSACTIONS WORK?HOW DO BITCOIN TRANSACTIONS WORK?
HOW DO BITCOIN TRANSACTIONS WORK?
 

Similar to BITCOIN FORENSICS : HAKON-2017 CONFERENCE

Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensicsanupriti
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies anupriti
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overviewanupriti
 
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEanupriti
 
Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)AJSH & Co LLP
 
IMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docxIMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docxMuskanRath1
 
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...Richard Givens
 
A primer on Bitcoin Technology
A primer on Bitcoin TechnologyA primer on Bitcoin Technology
A primer on Bitcoin TechnologySebin Benjamin
 
Yocoin.presentation
Yocoin.presentationYocoin.presentation
Yocoin.presentationTanvir Khan
 
YOCoin PowerPoint Presentation
YOCoin PowerPoint PresentationYOCoin PowerPoint Presentation
YOCoin PowerPoint PresentationCrypto Currency
 
Blockchain Technology.pptx
Blockchain Technology.pptxBlockchain Technology.pptx
Blockchain Technology.pptxAnshulDiwakar2
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensicsanupam50
 
Cryptocurrency-Bitcoin
Cryptocurrency-BitcoinCryptocurrency-Bitcoin
Cryptocurrency-BitcoinSatwikaHotwani
 
Bitcoin Technology
Bitcoin TechnologyBitcoin Technology
Bitcoin TechnologyRavi Verma
 
Bitcoin and Blockchain
Bitcoin and BlockchainBitcoin and Blockchain
Bitcoin and BlockchainChen Wu
 

Similar to BITCOIN FORENSICS : HAKON-2017 CONFERENCE (20)

Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overview
 
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)Report on Bitcoin- The cryptocurrency (November 2017)
Report on Bitcoin- The cryptocurrency (November 2017)
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
BITCOIN GLOSSARY
BITCOIN GLOSSARYBITCOIN GLOSSARY
BITCOIN GLOSSARY
 
RIYAS BitCoion ppt.pptx
RIYAS BitCoion ppt.pptxRIYAS BitCoion ppt.pptx
RIYAS BitCoion ppt.pptx
 
IMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docxIMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docx
 
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
 
A primer on Bitcoin Technology
A primer on Bitcoin TechnologyA primer on Bitcoin Technology
A primer on Bitcoin Technology
 
Yocoin.presentation
Yocoin.presentationYocoin.presentation
Yocoin.presentation
 
YOCoin PowerPoint Presentation
YOCoin PowerPoint PresentationYOCoin PowerPoint Presentation
YOCoin PowerPoint Presentation
 
Blockchain Technology.pptx
Blockchain Technology.pptxBlockchain Technology.pptx
Blockchain Technology.pptx
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
 
Cryptocurrency-Bitcoin
Cryptocurrency-BitcoinCryptocurrency-Bitcoin
Cryptocurrency-Bitcoin
 
Bitcoin Technology
Bitcoin TechnologyBitcoin Technology
Bitcoin Technology
 
Bitcoin and Blockchain
Bitcoin and BlockchainBitcoin and Blockchain
Bitcoin and Blockchain
 

More from anupriti

TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESanupriti
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itanupriti
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...anupriti
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generalsanupriti
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with exampleanupriti
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Groupanupriti
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Scoreanupriti
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardeninganupriti
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Nowanupriti
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?anupriti
 
Wirelurker
WirelurkerWirelurker
Wirelurkeranupriti
 
Cloud Computing and Virtualisation
Cloud Computing and VirtualisationCloud Computing and Virtualisation
Cloud Computing and Virtualisationanupriti
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensicsanupriti
 
BIG DATA AND SECURITY CHALLENGES
BIG DATA AND SECURITY CHALLENGESBIG DATA AND SECURITY CHALLENGES
BIG DATA AND SECURITY CHALLENGESanupriti
 
E-governance-and-Security
E-governance-and-SecurityE-governance-and-Security
E-governance-and-Securityanupriti
 
HACKED PC : -I don't care attitude
HACKED PC : -I don't care attitudeHACKED PC : -I don't care attitude
HACKED PC : -I don't care attitudeanupriti
 

More from anupriti (18)

TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand it
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generals
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with example
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Score
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Now
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?
 
Regin
ReginRegin
Regin
 
Wirelurker
WirelurkerWirelurker
Wirelurker
 
Cloud Computing and Virtualisation
Cloud Computing and VirtualisationCloud Computing and Virtualisation
Cloud Computing and Virtualisation
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 
BIG DATA AND SECURITY CHALLENGES
BIG DATA AND SECURITY CHALLENGESBIG DATA AND SECURITY CHALLENGES
BIG DATA AND SECURITY CHALLENGES
 
E-governance-and-Security
E-governance-and-SecurityE-governance-and-Security
E-governance-and-Security
 
HACKED PC : -I don't care attitude
HACKED PC : -I don't care attitudeHACKED PC : -I don't care attitude
HACKED PC : -I don't care attitude
 

Recently uploaded

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

BITCOIN FORENSICS : HAKON-2017 CONFERENCE

  • 1.
  • 2. Image Source : lucknowbytes.com
  • 3. The views expressed in this presentation are Mere Apne. Reference to any specific products, process ,or service do not necessarily constitute or imply endorsement, recommendation, or views of Min of Def or any Govt All images used are for illustrative purposes only & Do not promote any specific product
  • 4.
  • 5. This PRESENTATION is not going to make anyone of you a BITCOIN FORENSIC EXPERT INVESTIGATOR BUT may only LEND you few TERMS OF REFERENCES to build upon and EXPLORE further
  • 6.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Paap se Dharti phati-phati-phati, Adharm se aasmaan, Atyachaar se kaanpi Insaaniyat, Raj kar rahe Haivaan ... Jinki hogi taqat apoorv, Jinka hoga nishana abhed, Joh karenge inka sarvanaash ... ………….woh kehlayenge Tridev
  • 14.
  • 15.
  • 16. Name used by the unknown person who designed BITCOIN and created its original reference implementation SATOSHI NAKAMOTO कह ाँ गय ,उसे ढूंढो
  • 17.
  • 18. AS OF 07TH OCT 2017 1 BITCOIN IS WORTH 4356 $ SO 1 BITCOIN IS 2,85,079/- SOURCE : https://blockchain.info/charts/n-transactions
  • 19. 2 6 0 4 3 7 SOURCE : https://blockchain.info/charts/n-transactions
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. ANONYMITY VS PSEUDONYMITY Mark TwainSamuel Clemens public key addresses similar in function to an email address, are used to send and receive Bitcoins and record transactions, as opposed to personally identifying information.
  • 25.
  • 26. CRYPTOCURRENCY IS AN ATTEMPT TO BRING BACK A DECENTRALISED CURRENCY OF PEOPLE, ONE THAT IS NOT SUBJECT TO INFLATIONARY MOVES BY A CENTRAL BANK
  • 27.
  • 28. Bitcoin is starting to come into its own as a Digital Currency, but the Blockchain Technology behind it could prove to be much more SIGNIFICANT
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. More DETAILS a Forensic Investigator KNOWS about the TECH ARCHITECTURE, the CLOSER he gets to CLOSE the CASE
  • 35. BASICALLY CHUNKS OF INFO THAT CAN BE USED TO MATHEMATICAL GUARANTEE ABOUT MESSAGES
  • 36.
  • 37.
  • 38. Peer-to- Peer (P2P) network is created when two or more PCs are connected & share resources without going through a separate server computer
  • 39. Distributed Ledger is a Consensus of Replicated, Shared & Synchronized digital data geographically spread across multiple sites & countries
  • 40. Type of Distributed Ledger, comprised of Unchangeable, Digitally Recorded Data in packages called BLOCKS TAMPER EVIDENT LEDGER
  • 42.
  • 43. Linked list data structure, with each block containing a hash of the previous block
  • 44. Proof Of Work Is A Piece Of Data Which Is Difficult To Produce But Easy For Others To Verify And Which Satisfies Certain Requirements Bitcoin Uses The Hashcash Proof Of Work System. PROOF OF WORK
  • 45. Each block is formed by a proof-of- work algorithms, through which consensus of this distributed system could be obtained via the longest possible chain
  • 46.
  • 48. Thus blockchain provides the basis for the TRUSTLESS DISTRIBUTED SYSTEM
  • 49.
  • 50. A block is an aggregated set of data Data is collected and processed to fit in a block through a process called MINING Each block could be identified using a Cryptographic Hash
  • 51. Mining is the process of writing pages (blocks) of Bitcoin transactions into the ‘The Bitcoin Blockchain’, and getting rewarded with newly created bitcoins
  • 52. Block will contain a hash of the previous block, so that blocks can form a chain from the first block ever (known as the Genesis Block) to the formed block
  • 53. FIRST BLOCK : GENESIS
  • 54. Every 10 minutes, all Bitcoin transactions taking place are bundled into a block These blocks linked through a timestamp signing, form a chain (blockchain), which goes back to the first block ever created (mined) The time stamping makes it impossible to alter any part of it once the network confirms it
  • 55. These rules are inbuilt in the Bitcoin core software, which every node in the Bitcoin network runs Before a new block is added to the blockchain, the Bitcoin network has to reach a consensus on based on predetermined rules
  • 56. Data in a blockchain is internally consistent and immutable Each block’s hash is derived from the contents of the block Each block refers to the previous block’s hash, not a sequential number
  • 57. THE LAST BITCOIN (PROBABLY 21 MILLIONTH COIN) WILL BE MINED IN THE YEAR 2140
  • 58.
  • 59. “शरीर में 206 हड्डिय ां है, और सांविध न में 1670 क नून ... हड्िी से लेकर क नून सब तोड़त हूूँ….” SHA तोड़ के दिखा….
  • 60.
  • 61.
  • 63.
  • 64. A reward system, in the form of a website or app, that dispenses rewards in the form of a satoshi, for visitors to claim in exchange for completing a captcha or task as described by the website. SATOSHI : 1/100th of a Millionth BITCOIN
  • 65. A user for CONDUCTING TRANSACTIONS utilizing BITCOIN, he or she must first DOWNLOAD and setup a BITCOIN WALLET BITCOIN WALLET can show the total BALANCE of all BITCOINS it CONTROLS and let A USER PAY a specified AMOUNT
  • 66. WALLET contains a USER’S PRIVATE KEY, which ALLOWS FOR THE SPENDING of the BITCOINS, which are located in the BLOCK CHAIN Once wallet is INSTALLED & CONFIGURED, an ADDRESS is GENERATED which is SIMILAR to an E-MAIL or PHYSICAL ADDRESS
  • 67. WALLET is basically the Bitcoin Equivalent of a Bank account. Allows to RECEIVE BITCOINS, them, and then SEND them to others
  • 68. Connected to the Internet or is online is said to be HOT Cold Wallets & Hot Wallets Cold is considered most Secure & suitable for Storing Large Amounts of bitcoins Hot is suitable for Frequently Accessed funds COLD implies it is Offline or Disconnected from the Internet
  • 69. Designedto be downloaded & used on Laptops/PCs DESKTOPWALLETS Armory, Multibit, Msigna and Hiveto mention a FEW Easyto Access. Available for Different OS – Windows, Mac OS and Ubuntu.
  • 72. PHYSICALWALLETS Once they are generated, you print them out on a piece of paper Paper Wallets can Securely hold your BITCOINS in Cold Storage form for a long time Bitaddress.org or Blockchain.info
  • 73. BitcoinQt is the First ever built bitcoin CLIENT WALLET BITCOINCLIENTS WALLETS Original bitcoin wallet used by the Pioneers of the currency COMPUTERS installed with these wallets FORM PART OF THE CORE NETWORK & have access to all transactions on the blockchain
  • 75.
  • 76.
  • 78. They DON’T EXIST ANYWHERE, even on a hard drive
  • 79. When we say SOMEONE HAS BITCOINS & you look at a PARTICULAR BITCOIN ADDRESS, there are NO DIGITAL BITCOINS held AGAINST that ADDRESS BALANCE of any BITCOIN address ISN’T HELD at that ADDRESS; one MUST RECONSTRUCT it by looking at the BLOCKCHAIN
  • 80. Everyone on the NETWORK knows about a TRANSACTION and THE HISTORY OF A TRANSACTION can be TRACED BACK to the point where the BITCOINS were produced
  • 81. Conduct a SEARCH based on BLOCK NUMBER, ADDRESS, BLOCK HASH, TRANSACTION HASH or PUBLIC KEY
  • 82.
  • 84.
  • 85.
  • 86.
  • 87. LOCK FILE DEBUG.LOG PEERS.DAT WALLET.DAT BITCOIN-QT FOLDER STRUCTURE DB LOCK FILE EXTENSIVE LOGGING FILE PEER INFORMATION STORAGE FOR KEYS,TXN,METADATA etc
  • 88.
  • 91. BITCOIN-QT FOLDER STRUCTURE Blocks – This subdirectory contains blockchain data and contains a “blk.dat” file and a “blocks/index” subdirectory “blk.dat” stores actual Bitcoin blocks dumped in raw format The “blocks/index subdirectory” is a database that contains metadata about all known blocks
  • 92. Chainstate subdirectory- it is a database with a compact representation of all currently unspent transactions and some metadata about where the transactions originated BITCOIN-QT FOLDER STRUCTURE
  • 93. Database subdirectory - Contains database journaling files BITCOIN-QT FOLDER STRUCTURE
  • 94.
  • 95. 1.46 × 10^48 possible Bitcoin Addresses that gives every person on Earth 2.05×10^38 Different Addresses
  • 96.
  • 97. Bitcoin Mixer is an Anonymous Service, that confuses the trails of Bitcoin transactions.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108. PROJECT TITANIUM : Main thrust of the European Union’s Titanium Project is to Monitor blockchains, deanonymize wallet addresses, surveil dark net markets, and block terrorists and money launderers. TITANIUM, which stands for Tools for the Investigation of Transactions in Underground Markets
  • 109. Private key of the suspect, they can search for that particular key on the Blockchain to Trace the purchases to other potential Suspects. investigator has the Bitcoin
  • 110. Detecting such attackers is CHALLENGING any day Attacking Bitcoin via the Internet infrastructure using routing attacks As Bitcoin connections are routed over the Internet—in clear text and without integrity checks—any third-party can eavesdrop, drop, modify, inject, or delay Bitcoin messages
  • 111.
  • 112. BITCOIN FORENSIC ARTIFACT EXAMINATION Windows 7 Professional Multibit Bitcoin-Qt Bitminter Basic USB ASIC Bitcoin Gateway laptop ML6720 120 GB WD hard drive (4) USB ASIC Mining drives USB powered cooling fan 32 GB USB thumb drive
  • 113. • System Info • Info about Logged users • Registry Info • Remnants of Chats • Web browsing Activities • Recent Communications • Info from Cloud Services • Decryption Keys for encrypted volumes mounted COLLECTION OF BITCOIN ARTIFACTS
  • 114. Utilizing the data from 344 transactions, Meiklejohn able to identify the owners of more than a million Bitcoin addresses Sarah Meiklejohn, a Bitcoin focused Computer Researcher Extensive Research in Bitcoin Blockchain Found that by looking blockchain an investigator can uncover who owns a Bitcoin addresses
  • 115. 2015 “In this paper we show that combining TOR and BITCOIN creates an ATTACK VECTOR for the stealthy man-in-the-middle attacks. A LOW- RESOURCE ATTACKER gain FULL CONTROL of information flows between all users who chose to use Bitcoin over TOR. In particular the attacker CAN LINK TOGETHER USER’S TRANSACTIONS regardless of pseudonyms used”
  • 116. Bitcoin transactions occur via a Network Connection, an investigator should seize any Physical Object that can connect to the Internet in addition to the hard drive COLLECTION OF BITCOIN ARTIFACTS
  • 117.
  • 119.
  • 120.
  • 122.
  • 123. Source : Alex Biryuk et al., Deanonymisation of Clients in Bitcoin P2P Network Bitcoin network is composed of PEERS connected to others PEERS over unencrypted TCP channels Each peer attempts to maintain EIGHT outgoing connections to other peers These eight peers are called ENTRY NODES
  • 124. Transaction and Block messages are propagated in network by being Relayed through these ENTRY NODES to other peers When X sends a transaction advertising that he is transferring ownership of 1 BTC to Y, his computer sends an inv message to its immediate peers, the entry nodes
  • 125. The inv message lets the entry nodes know that there are transactions or blocks Entry nodes relay the data farther throughout the network by sending inv to their own peers Entry nodes request full transaction by sending getdata response to X’s computer
  • 126.
  • 127. SMART CONTRACTS are computer protocols that facilitate, verify, or enforce the negotiation or performance of a CONTRACT, or that make a contractual clause unnecessary. Smart contracts often EMULATE the logic of contractual clauses.
  • 128. "A system condition in which system resources are free from unauthorized access and from unauthorized or accidental change, destruction, or loss."
  • 129.
  • 130.
  • 131.
  • 132.
  • 134. Number of blocks preceding particular block on a block chain. Genesis block has a height of zero because zero block preceded it.
  • 135. How difficult it is to find a block relative to the difficulty of finding the easiest possible block. The easiest possible block has a proof-of- work difficulty of 1. Difficulty is changed every 2016 blocks based on the time it took to discover 2016 previous blocks.