Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A Practical Hands-on Approach to Database ForensicsPyBit Forensic Investigation

A Practical Hands-on Approach to Database Forensics: PyBit Forensic Investigation [This chapter focuses on the examination of PyBitmessage Messenger. The Bitmessage protocol, which the PyBitmessage Messenger is based on has been developed with the aspiration of preventing all of the investigations approaches. Also, cybercriminals have become aware of this messaging protocol. This chapter describes how to gather pieces of information about messages, sender, and recipients of the Bitmessage network, how to analyze PyBitmessage database files with the specific stipulation to support investigations.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

A Practical Hands-on Approach to Database ForensicsPyBit Forensic Investigation

Part of the Studies in Big Data Book Series (volume 116)
Springer Journals — Oct 22, 2022

Loading next page...
 
/lp/springer-journals/a-practical-hands-on-approach-to-database-forensics-pybit-forensic-JucI9Teto7
Publisher
Springer International Publishing
Copyright
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
ISBN
978-3-031-16126-1
Pages
125 –174
DOI
10.1007/978-3-031-16127-8_5
Publisher site
See Chapter on Publisher Site

Abstract

[This chapter focuses on the examination of PyBitmessage Messenger. The Bitmessage protocol, which the PyBitmessage Messenger is based on has been developed with the aspiration of preventing all of the investigations approaches. Also, cybercriminals have become aware of this messaging protocol. This chapter describes how to gather pieces of information about messages, sender, and recipients of the Bitmessage network, how to analyze PyBitmessage database files with the specific stipulation to support investigations.]

Published: Oct 22, 2022

There are no references for this article.