Thursday 15 September 2011

I can now accept donations!

I now accept donations and, if anyone feels the need, commissions.
I can have almost all of my work printed, or remade etc.
All donations must be made in Bitcoins.

Wednesday 14 September 2011

Technological creativity and energy focused

Over the past couple of days I have felt compelled to upgrade, secure and generally improve my technological storage, communication and access. I have learned a great deal of things on my journey for privacy, security, ease of access, and full utility. Here is a list of the things that I have gained competency and understanding of and the methods of using this knowledge that I am now fluent in.
All my learning of these systems was done on my own experimentation on my OWN HARDWARE. My knowledge of these systems is purely for academic interest.
  • GnuPG or OpenPGP - secure communication, cryptography.
    • Creation of encryption keypairs.
    • Forming online "Web of Trust".
    • Encrypting/decrypting files and messages.
    • Effective security practices such as hidden external storage.
  • FreeNAS - storage
    • Network Accessed Storage.
    • Initial set-up.
    • Creation of RAID (Redundant Array of Independent Disks).
    • Initializing of central drive pool using ZFS (a disk filesystem designed by Sun Microsystems) which uses a Merkle Tree of checksums to maintain file integrity.
    • Set up of Apple Filing Protocol (AFP) to share files over the network and maintain privileges.
  • MySQL - information retrieval (my first little nit of naughtiness).
    • Basic MySQL injection.
    • Database retrieval request structure.
    • Website security scoping.
  • Metasploit - network penetration and security testing (started to go over to the dark side).
    • Installation of the Framework.
    • Vulnerability scanning.
    • Payload delivery.
    • Ethical use of high risk software.
  • Bitcoins - Online cryptocurrency
    • Block system used to make and validate purchases.
    • Block solving (mining) to create more currency.
    • Mining pools to make block solving more efficient.
    • Limited economy to control inflation.
    • Decentralized peer to peer purchases.
  • Edit: Wireless Encryption technology
    • Locating insecure networks.
    • Performing advanced diagnostics on encryption used.
    • Performing attacks on wireless systems to gain useful data.
    • Decryption of Unique IV's to gain WEP keys.
    • Performing dictionary and brute force attacks on WPA/WPA2 four way handshakes.
Soon I will go further into my experimentation with these topics, except for GnuPG.
Through this there are a number of projects that I would like to experiment further with and for specific reasons.

FreeNAS.
This FreeBSD based OS was recently updated to version 8.0.1 to include support for the latest version of ZFS, Zettabyte File System, however in the process of being updated, a number of features that the previous version (7.2) supported, such as a Bittorrent client, and UPnP AV. Hopefully I will become more competent with this OS when the next version (8.1) is released with these features, until then I will continue to use it on my fileserver.

MySQL injection.
I am just very curious in this method of illegitimately gaining information from webservers, as it can be very easily stopped however many system admins are lazy and don't screen the SQL commands so you cant use them.

Metasploit Framework.
Again this method of gaining access to a system makes me extremely curious. Being a framework of tools for tech savvy security specialists, its like giving the keys to a tank to an 11 year old boy. They will probably work very, very hard to learn how to drive that tank even though it will take them years and years. Just because its got so much power behind it.
When I want to learn more about this I am going to do so through an OS called BackTrack Linux. A platform with the Framework built in, specifically designed for network penetration.

Bitcoin.
I'm slowly investigating the efficacy of starting a Bitcoin mining operation, generate some more cash on the side while doing very very little. I believe this to be a very interesting concept, and regardless of the profitability of the venture it should be a worthwhile project considering security and other management and administration.

Edit:
Wireless Technology
I also recently became interested in the security of local WiFi networks. As it is, I have come to the conclusion that without above average technical know how, many ordinary people have no idea of the security (or lack thereof) in place on their network, and have absolutely no idea that they are vulnerable to local security threats. I did an analysis of the vulnerability of all the local networks in my area (of which there are many, and 40%-60% of the networks, are not only vulnerable to intrusion, but some of them were such blatantly easy targets that anyone given the willingness to do so, could learn to break the encryption used and gain access to their networks. However this was not my goal, my goal was to gain knowledge of this technique (knowledge can't get you arrested, or can it?) so I set up my own router to mimic the security level of these surrounding vulnerable networks, and proceeded to attempt to break into my own connection. It took me about 2-5 minutes each time I attempted to recover my "lost" key, depending on how much traffic was going through the router and how much interference there was on that particular channel (the place where I live has no wireless channels that don't have more than 2 networks on them already). I also tried setting up my router to use the highest level of encryption available to a home user. This cracking method is much more time and power consuming, as it involves using a program to generate keys that match a specific criteria and then pipe them through to another program which then hashes them against the 4 way handshake. Unfortunately for those of use who don't go to work and use a supercomputer every day, this method can take years to crack a single key as there is an incredibly large number of combinations as the minimum number of characters for a WPA password is 8 (I quickly gave up on trying to decrypt my key which was incredibly complex). However using a dictionary of known and commonly used passwords can be quite successful in recovering a lost password or gaining entry into a local wireless network.
I am now eagerly looking forward to the day when the processing power required to brute force a password such as this is publicly available.

These tools/skills are all invaluable to technically minded people living in a digital age, somewhat akin to knowing how to make a bow and arrow in ancient times. I think that mere knowledge of the existence of these tools is not enough, knowing that food exists and knowing how to find/cook it was an important factor in staying alive. Nowadays, food has been replaced by information and knowledge.

Wednesday 7 September 2011

First film post!

Me and a firetwirling friend of mine, Lukas Bola, have decided to start collaborating using his awesome skills with contact staff and my sort of awesome skills at filmography (mostly my ability to acquire the technology that we need). We ran this video through adobe after effects using multiple blended layers with an echo effect and modified colours.
This particular video was just a proof of concept (hence the reason why its only ~30 seconds long) and there will most likely be another video like this produced soon (once I have the time).
Enjoy.

Monday 5 September 2011

Drawing for great justice

I have decided that my sketching skills need improvement, so I've begun a series of mixed media illustrations with a particular theme around each.
One will be organic, drawn and modified using illustrator..
One will be digital, drawn and photoshopped.
One will be mechanical, either drawn and photoshopped or built, photographed and drawn.
One will be musical, photographed and drawn.
One will be abstract, and I haven't worked out how I'm going to do this one yet.

This is a photo of the first illustration: Organic
It still needs to be scanned in and imported into illustrator however I don't have a scanner available to me at the moment.

Edit: This is the next drawing in the series. Its unfinished because its just a frame for digital media. Again this still needs to be scanned into illustrator for some edits, and putting the main feature inside the frame.

Thursday 1 September 2011

Started working with Illustrator

I decided recently that I should become more familiar with Illustrator, so I started a small project to trace a photo into illustrator, use Illustrator to manipulate the vector based graphic, and then import the project into Photoshop and apply some more aesthetic effects.
I wanted to keep some things from the original image tied in with the theme. As most of the shoot had some form of mirror in it, I thought it might be nice to get a "Through the Looking Glass" style theme, the other aspects of personality coming through reflection.
This is the final:







 
The model used for this was a good friend of mine called Robyn, (I've used her for some previous works before). Hopefully I'll be able to organise a time to do some more photography, so I can do some more stuff like this. Possibly even some 3d stuff. 
This is the only source photo for this project: