Bit362 Digital Forensics: Student Name
Bit362 Digital Forensics: Student Name
Student name
Table of Contents
Executive summary...............................................................................................................................2
Introduction...........................................................................................................................................3
Methods and techniques.......................................................................................................................3
Email and the chart services..............................................................................................................4
Passwords and Seed phrase..............................................................................................................5
Wallet analysis...................................................................................................................................5
Web browser history.........................................................................................................................6
Blockchain explorer...........................................................................................................................7
Conclusion.............................................................................................................................................8
References.............................................................................................................................................8
1|Page
Executive summary
Searching for digital currencies or cryptocurrencies has become a priority. All cryptocurrency-related
trades are stored in a blockchain and are not traded (e.g., immutable), which helps more than just
break the detection of fraud. Digital currency trading is needed to detect fraud and perpetuate
market integration. Many parts of digital certification management have been reduced. There are
many explanations for this, other than the rapid and widespread transfer of digital tools, investment
margins, and the lack of adequate reporting. Digital justice, with permissions, tools and key
personnel will be a viable option. Demonstrating a good return on investment is important for
meeting the needs of employees. Funding these efforts will create a mix of race, state, and federal
funds, and this can make it difficult for small businesses. Local and diverse models make it easy to
coordinate, letting officers know where support is needed.
Improving digital evidence education is not part of the basic research of police academies, however,
officers with all levels of expertise can relate to digital evidence related to case resolution. For
example, training improves the collection of evidence, such as instructing police officers on bag
physics that are needed to disassemble electronic devices. Lessons face large digital arts, limited
equipment, and the potential for changing observers. The reason for the business is the lack of
employee training in digital authentication. The backlash led to failed training as the team withdrew
its rivals from the playing field, and the backlash cut requests for the transfer of inadequate
equipment, previously or failed, financially and permits due to office delays due to financial
constraints., the digital evidence to be produced at each stage of the investigation and prosecution
and the work to be done.
In the age of digital evidence, the main focus is on the magnitude of laptop-related infringement.
Today, however, there is a digital physical device for almost every crime that can help detect the
extent of a collision. As a result, the investigation already includes, but digital evidence can also be
used for cybercrime. For example, analysts may think it is necessary to estimate whether the
information is unreliable or in the victim’s cloud accounts, and if it does not get it properly, it can
provide accurate information. Many reports of laptop violations may or may not exceed the limits of
investigation and / or prosecution. As victims of this crime turn to each other for help and murder,
appropriate response procedures are designed not only to help the victim, but also to record the
evidence and digital information they choose. Search and arrest by state authorities. This is an area
of much debate about digital evidence. Finally, Riley’s recent phone call (Riley v. California, No. 13-
132) revealed a change in the physical and mental evidence that should be allowed, cell phone
content, as opposed to ventilated physical data. one man. The distinction was made because of the
retention of essential elements of portable devices that would contain information about living
conditions, partners, and activities that would be outside the scope of the research. Riley makes it
difficult to distribute on screen. Once the cooperative system is set up, there is a risk that the cell
phone lock will be removed with the remote control or illegal keys, resulting in them not gaining
access to the knowledge.
2|Page
Introduction
Local system
Escape
Search of line
Grid system
Spiral method
Method of Wheel search
The search is random
A crime scene was created to develop some web resources and replace Bitcoin. This allows
instructors to explore all the topics identified during the studies and apply them in the study of
theory. This involves creating multiple money numbers and placing activity symbols so that students
can create scenarios around the data they see. The tests are designed to test students
’understanding of the Bitcoin environment and highlight techniques they have learned in their
learning. Professionals should use appropriate procedures to analyse the data in order to follow up
and validate their results. evidence-based procedures showing how further steps should be taken to
identify defendants and examine the relevance of the evidence to their findings and limitations. It is
3|Page
not difficult to send key documents, as it is important to know that low-achieving students should
not be judged when making the assessment.
4|Page
Passwords and Seed phrase
The first step is to access wallet information; In general, " seed phrase" (12-16 words) should fit in
the wallet (assuming you have the ability to do so). Identifying a system or device such as store
passwords, static data, records, or encrypted storage will help open a wallet / address to be copied.
A useful store password for retrieving cryptographic devices and wallet information you want to
crack. People often use passwords that are similar to each of their accounts, which can be useful
information when trying to access wallet information saved from published images.
Wallet analysis
Every cryptocurrency business has started and cut out of the cryptocurrency address and / or wallet.
The address is similar to a bank account and has a similar history in the history of the business. A
wallet is a collection of addresses that can be a "wallet" (where crypto currency is stored "and other
exchanges, for example), a wallet (where money is received from of equipment or data) wallet based
- considered the most secure.), or desktop wallet software (a source of revenue for computers and /
or mobile devices). Knowing these things early on will help the researcher understand the financial
process involved in the problem. Artifacts such as wallet.dat files or wallet software such as meta
mask or myetherwallet.com can help recover funds and / or integrate crypto transactions.
5|Page
Web browser history
Browser history contains useful information about various user activities that are often useful for
researching cryptocurrency markets. The cache and history of the web browser help with the
exchange analysis that can be associated with the operation of the blockchain. Usernames and
passwords are usually found in your browser history or cache.
6|Page
Blockchain explorer
In identifying key locations and businesses, blockchain explorers are essential tools for blockchain
discovery and tracking the flow of money from one wallet to another. Government sources such as
ether scan or blockchain.com may help, but commercial products may be needed for more detailed
analysis.
It should be noted that unscrupulous individuals try to hide the blockchain industry with tools like
“mixers” or “ejectors” that break down the flow of money into smaller, more efficient processes.
These are difficult to track.
7|Page
Conclusion
Bitcoin is the main cryptocurrency that moves while holding the blockchain. The scary news is that
blockchain infringement does not end with Bitcoin. There are also many forms of money
cryptocurrencies, and there are ways to use them illegally. The supporting news is that the law has
created credibility to target the new developments that are most affected, which means only
disrupting the time-related impact of digital currency, including the version out right on equipment
and out of the box.
References
Cheah, E.-T. and Fry, J. (2015). Speculative bubbles in Bitcoin markets? An empirical investigation
into the fundamental value of Bitcoin. Economics Letters, [online] 130, pp.32–36. Available at:
http://webdelprofesor.ula.ve/economia/smzerpa/docencia/postgrado/Econom
%EDaMonetariaInternacional/materialdeapoyo/paper18.pdf [Accessed 26 Dec. 2018].
Van Der Horst, L., Choo, K.-K.R. and Le-Khac, N.-A. (2017). Process Memory Investigation of the
Bitcoin Clients Electrum and Bitcoin Core. IEEE Access, 5, pp.22385–22398.
Wu, Y., Luo, A. and Xu, D. (2019). Identifying suspicious addresses in Bitcoin thefts. Digital
Investigation, 31, p.200895.
8|Page