This is the first post in a series, where I want to present my interpretation of hacking runs.
With several posts (all int his thread) I want to cover several situations, and my interpretation of how the matrix rules can be used and balanced.
(might not be the order of final posting)
Hacking a host and performing a data steal
Hacking through a relay of linked nodes
Hacking a security camera and performing overwatch
Hacking someone's wireless equipment
Hacking into a drone network
TODAY: Hacking a host and performing a data steal
Note that this is only my interpretation and not final. I might edit this post a lot during the next days, depending on comments and other considerations, but I will note changes by using different colours and maintaining a changelist.
General comments:
Deleted subscriber house rule
1.) When you successfully hack in, you have a valid user/security/admin account for this session only. When you leave the node, your account has gone. Legal actions (actions covered by the permissions of the account) can be performed by a simple computer+skill test (if needed at all). Illegal actions (actions not covered by the permissions of the account) must be perfomred by an opposed hacking+skill test vs. system+firewall of the node. The GM may call for an extended oppesed test if a certain treshold has to be achieved. Net hits of the node determine that the node notices that something is being tempered with. The GM decides what happens with which number of net hits.
2.) IC/agents have to successfully detect a stealthed hacker to engage in actions (including analyzing hack attempts) against him.
(H) Hacker:
Hacking: 5 (specialization stealth)
Computer: 5
Hot-SIM: +2 dice
Firewall: 5
Response: 5
Firewall: 5
Signal: 5
Loaded programmes:
- Exploit 5
- Analyze 5
- Browse 5
- Stealth 5
Not loaded programmes:
- Edit 5
(N) Node:
Firewall: 4
System: 4
Signal: 4
Response: 4
Loaded programmes:
-Analyze 4
(IC1) IC: Patrol-1
Pilot 4
-Analyze 4
-Attack 4
-Armor 4
(IC2) IC: Patrol-2
Pilot 4
-Analyze 4
-Attack 4
-Armor 4
Steps:
(bold steps denote the minimal version of this example)
(H) Hacking In
(N) Noticing the Hack
(H) Matrix Perception
(IC1) Matrix Perception
(H) Stealth roll
(IC2) Matrix Perception
(H) Stealth roll
(H) Unload Exploit
(H) Load Edit
(H) Browsing for Data
(H) Browsing for Data
(N) Noticing the Hack
(IC2) Noticing the Hack
(H) Stealth roll
(H) Downloading the Data
(N) Noticing the Hack
(IC2) Noticing the Hack
(H) Stealth roll
(H) Logging off
Explained:
(H) Hacking In
Hacking+Exploit(Firewall, 1 Turn): 5+5+2 = 4 hits (porb. to fail hacking in in 1 turn: 39%)
The hacker is trying to hack into the node. He is going for a user account. The rules say he has to engage in a Hacking+Exploit (firewall, 1 turn) test, to do so. With his first roll he is beating the treshold and is in.
(N) Noticing the Hack
Firewall+Analyze(Stealth): 4+4 = 4 hits (prob. to notice the hacker in 1 turn: 9%)
The node is trying to notice that somebody is hacking in. He rolls, per RAW, Firewall+Analyze versus a treshold of the hackers Stealth programme. As this is a "hack on the fly" attempt, the node may roll everytime, the hacker is rolling to hack in. In our example, the hacker needed only one try, so the host may only roll once, too.
As the node scores only 4 hits, and the stealth programme of the hacker is 5, he is not noticed. The GM may note down the 4 hits, as they may act as a treshold for the hacker to clear the system logs of his hack attempt.
(H) Matrix Perception
Computer+Analyze vs Firewall+Stealth
The hacker is setting his analyze programme to constantly analyze his sourroundings. He is rolling Computer+Analyze vs. Firewall+Stealth to find stealthed IC or backdoors. For ease of gameplay, the GM is only rolling this test for stealthed objects. If the hacker wants to further examine something he has already detected to gain further information he must explicitly say so.
As the two patrolling IC are not stealthed, the hacker sees them without performing any test. The GM does not have to roll for stealthed objects, as neither the IC, nor the node, are running any stealth programmes.
(IC1) Matrix Perception
Pilot+Analyze vs Computer+Stealth: 4+4 = 3 hits
The patrolling IC Patrol-1 is set to constantly analyze the node for intruders. As the hacker has a valid user account for this session, he is no intruder, but the IC will have to detect the presence of the hacker to note any hacking actions he might undertake. As the hacker is running a stealth programme, the IC must undertake an opposed test to detect him. For ease of gameplay, this test should be rolled by the GM.
(H) Stealth roll
Computer+Stealth vs Pilot+Analyze: 5+5+2+2 = 3 hits (prob. for the hacker to get noticed: 13%)
The GM rolls 3 hits for the hacker. The IC does not detect the presence of the hacker. Unless something happens, the IC will not attempt again to detect the hacker. If the IC tryies again, it will have a -2 dice penalty for trying again.
(IC2) Matrix Perception
Pilot+Analyze vs Computer+Stealth: 4+4 = 5 hits
The second IC (Patrol-2) is trying to detect the hacker, too.
(H) Stealth roll
Computer+Stealth vs Pilot+Analyze: 5+5+2+2 = 3 hits (prob. for the hacker to get noticed: 13%)
The IC has 1 net hit in this opposed test. It has detected the hacker. As the hacker has a valid user account for this session, the IC does nothing else.
(H) Unload Exploit
Simple Action
The hacker is unloading his Exploit utility. He can only have 4 programmes running without a response penalty and wants to load an edit tool.
(H) Load Edit
Complex Action
The hacker is loading his edit tool.
(H) Browsing for Data
Computer+Browse(5, 1 Phase) 5+5+2 = 3 hits, 8 hits = 2 phases
The hacker is using his user account to browse for the file he seeks. The GM knows that the file is not listed in the directories that are accessible for normal users. He decides, that it will need an extended test (5, 1 phase) for the hacker to find, that the file is not listed in the directories. As this is a legitimate action, the ahcker uses his computer skill. After 2 phases the hacker accumulates 8 hits and is informed that the file is not listed. IC2 is constantly analyzing the hacker, but as he is doing nothing wrong, nothing happens. IC1 is not even aware that the hacker is in the node. (Note: Some very high security system might synchronize the detections of their IC, but this triggeres wrong alarms, very often. GMs, do not synchronize your IC unless you want to make your system extremely high security, as sucess probabilites for a hack decline rapidly.)
Note that the hacker is using computer+browse only because he exactly knows which file he is looking for. If he only knew which kind of information he was looking for, he might have to use the data search skill and face a much higher treshold.
(H) Browsing for Data
Hacking+Browse vs System+Firewall (1, 1 Phase) 5+5+2 = 3 hits
The hacker has not found the files in the user acessible indexes. He knows that the file is there, so he tries to hack into the full file index.
This is an illegitimate action, as accessing the full file directory would need security access. The GM decides that finding a simple file in an index is an (1, 1 Phase) extended test.
Note that the hacker would be using hacker+browse even if he only knew which kind of information he was looking for, but he might have to face a much higher treshold.
(N) Noticing the Hack
System+Firewall vs Hacking+Browse (1, 1 Phase) 8+8 = 2 hits (prob. for the hacker to get noticed: 19%)
The node is trying to detect that sombody is hacking into the file system. As the hacker achieves 1 net hit, he is finding the file in 1 phase. he GM may note down the 2 hits, as they may act as a treshold for the hacker to clear the system logs of his hack attempt.
(IC2) Noticing the Hack
Pilot+Analyze vs Hacking+Stealth 4+4 = 1 hit
IC2 is constantly scanning the node for intruders. As the hacker is now trying to o something, that is not covered by his access rights, the IC might notice it. The GM is rolling an opposed Matrix Perception test.
(H) Stealth roll
Computer+Stealth vs Pilot+Analyze: 5+5+2+2 = 3 hits (prob. for the hacker to get noticed: 13%)
The IC does not notice the hacing attempt of the hacker.
(H) Downloading the Data
Hacking+Edit vs Firewall+System (1, 1 Phase) 5+5+2 = 3 hits
The hacker is trying to download the data. As the file can only be read (and downloaded) with security access, he has to perform a hack to do it.
In his first try, he rolls 3 hits.
(N) Noticing the Hack
System+Firewall vs Hacking+Browse (1, 1 Phase) 8+8 = 2 hits (prob. for the hacker to get noticed: 19%)
The node again tries to detect the hack. It rolls 2 hits, which means the hacker achieves 1 net hit and downloads the file.
(IC2) Noticing the Hack
Pilot+Analyze vs Hacking+Stealth 4+4 = 2 hit
As the hacker is again trying to o something, that is not covered by his access rights, the IC might notice it. The GM is rolling an opposed Matrix Perception test.
(H) Stealth roll
Computer+Stealth vs Pilot+Analyze: 5+5+2+2 = 3 hits (prob. for the hacker to get noticed: 13%)
The IC does not notice the hacking attempt of the hacker.
(H) Logging off
The hacker is login off. Note that the node accumulated 8 hits during the hack. This means, the hacker left lots of evidence of his activities in the node.
Discussion:
This was an example of a competent hacker (all ratings 5), hacking into a high traffic database (node 4) with good security (analyze 4, 2 patrolling IC).
To achieve his run unnoticed he had to hack in in 1 turn (giving the node 2 tries to achieve his stealth treshold of 5 would result in a 66% chance of being detected). Hacking in in 1 turn left him with a 9% chance of being detected.
In the node he had to do 2 opposed test with 12 dice vs 8 dice (browsing and downloading). His chance to fail such a test are 19%. His chance to fail at least one of the tests are 35%. Edge can be used here.
Then he had to survive the scanning attempts of the IC. Depending on how many of the IC detected him at the initial test, he had to face 0-4 opposed test with 14 dice vs 8 dice. As mentioned before, the chance to fail one such a test are 13%. As tehre opposed tests are doe by the GM, the GM might as the player beforehand whether he might invest Edge to avoid detection. The GM can then use Edge in such cases.
Note, that Edge-wise it makes a huge difference whether the hacker is rolling ONE stelath test when he enters the node, which every IC has to beat, or whether he (or the GM for him) is rolling a stealth test seperately for each IC. I recommend the second version.
All in all, GMs should be careful. After the hackers Edge has run out he is very likeley to trigger an alarm, which is very bad in most hacking runs.
The rolls in this run were tailored such, that it does not get too long and different situations are explained. The chance (without Edge) for the hacker to get this run through unnoticed are under 40%.
Better figure out the probabilites beforehand (i.e. with a calculator tool like this: http://www.serbitar.de/stuff/probabilities.xls ).
Thanks to comments from:
Dashifen
Aku
Rotbart van Dainig
blakkie
Edit:
- Changed Karma for Edge
- added hot-sim, stealth specialization, changed probabilites
- added hint about data search
- deleted subscriber house rule
- added not loaded programmes
- corrected wrong attributes used in scanning tests for IC
serb you may want to factor in that most hackers would go in HOT ASIST and that they just maybe specialized in the most important of hacking tasks in the game the entry
so an Exploit specialization would not be unlikely
Karma can be used for hacking??
he means edge
Damn, sorry, I'm still playing SR3, too . . . I'll convert that .. .
| QUOTE (Kremlin KOA @ May 8 2006, 07:06 AM) |
| serb you may want to factor in that most hackers would go in HOT ASIST and that they just maybe specialized in the most important of hacking tasks in the game the entry so an Exploit specialization would not be unlikely |
Also how fast does the runner need the file?
If he has overnight he might as well do it the slowway, with packet sniffing
Sure, but then he might have gone for admin access anyway (no reason not to), and then he wouldnt have to roll anything at all, as an admin can do anyhting. That would have made my example rather short . . .
| QUOTE (Serbitar) |
| Sure, but then he might have gone for admin access anyway (no reason not to), and then he wouldnt have to roll anything at all, as an admin can do anyhting. That would have made my example rather short . . . |
I know that you have a different opinion, but I can not model any rule set which
- lets IC analyze things
- is not totally impossible to hack
- does not need an infinite ammount of dice rolling
- gives admin and security access and advantage over normal access
with that assumption.
I would recommend sattelite nodes to prevent easy hacking. The hacker may get admin access to the sattelite, by probing, but then he has to ist there for several hours if he wants to get admin access to the second line "real" node. IC or patroling security personel (security hackers?) could wonder what even an admin is doing there for hours . . . (if they detect him)
| QUOTE (Serbitar) |
1.) The "subscriber" rule works for non hacking attempts only. If something is accepting input only from a certain device, this restriction can be bypassed by a simple hacking attempt. Otherwise, for example a security camera, a maglock or whatever could never be hacked directly. |
| QUOTE (Serbitar again) |
| If it was hardwired to it's controlling node, it could not even be used as access to the local net, as it would not accept connections from your comlink. |
| QUOTE (Serbitar @ May 8 2006, 08:10 AM) |
| I know that you have a different opinion, but I can not model any rule set which - lets IC analyze things - is not totally impossible to hack - does not need an infinite ammount of dice rolling - gives admin and security access and advantage over normal access with that assumption. |
| QUOTE (Aaron) | ||
You could, but I believe you'd only have access to the device itself. This is useful if you just want the device, but not at all useful if it's the node you want. |
| QUOTE (Serbitar @ May 8 2006, 08:28 AM) | ||||
You could not hack into the camera, as the camera, per RAW, would not accept input from you. You had to spoof an ID that the camera accepts input from. And when the camera was hardwried into the network, there would be no way that you could sniff any traffic to derive the desired ID. |
| QUOTE (blakkie) |
| |
Apparently your memory is quite short. ![]()
| QUOTE (page 228) |
| When an intruder alert is triggered, the node will launch an IC program and direct it to engage the intruder(s). |
| QUOTE |
| As I like to have IC that is roaming about and analyzing stuff |
| QUOTE |
| I would have to think of some reason why somebody would want admin access, as it does not have any advantages any more |
@blakkie
p. 222 Patrolling IC . . . (emphasis by me)
I want to have patrolling IC, because I like the idea, i ilke how it adds to the hacking experience and because it is in the rulebook.
As to tapping the camera: thats a valid thing to do, but this makes subscribing just an additional dice roll to to. Just complicating things without adding anything. I just dont like it. I stated before several times that this is my interpretation of the matrix rules.
| QUOTE (Serbitar) |
This is the first post in a series, where I want to present my interpretation of hacking runs. With several posts (all int his thread) I want to cover several situations, and my interpretation of how the matrix rules can be used and balanced. |
| QUOTE |
| @blakkie p. 222 Patrolling IC . . . (emphasise by me) |
| QUOTE |
| I stated before several times that this is my interpretation of the matrix rules. |
You are neither creating problems, nor solutions. In fact you have not contributed constructively to any of the matrix threads arround.
I know your argumentation, I know your view of the situation (even before this thread. I considered it and mentioned you in the credits because of this) and I think, by now, everyone reading this thread does, too. So everybody who is sharing your view can skip this thread and label it "not appropriate" for him.
Everybody who is interested in a workable solution can read on (at least until blakkie is coming up with his own).
| QUOTE (Serbitar @ May 8 2006, 09:24 AM) |
| In fact you have not contributed constructively to any of the matrix threads arround. |
Okay
Blakkie: Serbitar has a point in tat using patrolling IC would be a cost effective way to provide a second layer of defence to a host
Serbitar: Blakkie has a point in that IRL hacking is done by packet siffing or finding a OS exploit that allows root (admin) access and abusing thepriveledges given therin, therefore shadowrun modelling it such is quite realistic.
| QUOTE (Kremlin KOA @ May 8 2006, 09:39 AM) |
| Okay Blakkie: Serbitar has a point in tat using patrolling IC would be a cost effective way to provide a second layer of defence to a host |
Then tell me how you want to manage player comlinks, where they can install as much IC as the rules allow? (Analyze 6, 3-4 Analyze 6 Agents on a 6 comlink)
Johnsons, runners and people of the same category do what is possible by the given rules.
You have to balance matrix hosts against that. As I said before, you have never tried to fit it all into a consistent picture. I have at least tried to.
| QUOTE (Serbitar) | ||
Ok, the slow way: If I drop the assumption that a hacker, who has hacked in with acces rights which would allow a certain action to be performed, if it was a valid account, can not perform this action without any consequences (this is what you want) i have several problems: - I would have to make scan roles for every IC all the time, or disallow scanning IC - I would make hacking next to impossible, or skip allowing IC to analyze hackers or hacking actions - I would have to roll tons of dice, because every IC in the system is constantly analyzing each action of the hacker, or disallow IC to analyze constantly - I would have to think of some reason why somebody would want admin access, as it does not have any advantages any more As I like to have IC that is roaming about and analyzing stuff AND I want to make hacking possible AND I dont want to roll tons of IC AND I want the admin account to mean something I have to drop the assumption that you would like to see som much. |
Good points. Thats why I am restricting anlayzation rolles to illegal actions. If every action, even those covered by the hacked account, where illegal, I would have to roll much more often.
| QUOTE (Serbitar @ May 8 2006, 09:55 AM) |
| Then tell me how you want to manage player comlinks, where they can install as much IC as the rules allow? (Analyze 6, 3-4 Analyze 6 Agents on a 6 comlink) Johnsons, runners and people of the same category do what is possible by the given rules. You have to balance matrix hosts gainst that. As I said before, yopu have never tried to fit it all into a consistent picture. I have at least tried to. |
Also remember that you as the GM decide what is "illegal" for an Admin account and what is "legal." Corp Security designers aren't stupid. They know Hackers can get in with Admin access, so they aren't going to let Admin's do everything any time they want. Any action that is "overtly" damaging or hostile should not be under the pervue of the Admin account. Period. Therefore, the Hacker makes his Hacking roll, and the system makes its roll to oppose. In fact, I would say the system is more prone to analyze actions taken by the Admin account than any else.
Think about hueristic virus scanners. That's basically what they do. Virus usually do their nastiness by using low-level system interrupts and such (stuff that I would call "Admin" actions). The anti-Virus programs look specifically for an unusually high number of those actions and try to detect if they originate from a malicious source. So, if anything, Hackers should be "logging on" with normal User privelages and "hacking their way up" to things they want to perform. I would say that systems "watch" what Security and Admin users are doing more than regular "Joe users."
Oh thank god I'm not agreeing with blakkie anymore
Blakkie
the starting hacker in the book has rating 5 comlink
| QUOTE (Kremlin KOA @ May 8 2006, 10:50 AM) |
| Oh thank god I'm not agreeing with blakkie anymore Blakkie the starting hacker in the book has rating 5 comlink |
| QUOTE (mdynna @ May 8 2006, 11:36 AM) |
| Also remember that you as the GM decide what is "illegal" for an Admin account and what is "legal." |
| QUOTE (Serbitar) | ||
Per definition an admin account can do anything. |
| QUOTE (Serbitar) |
| @blakkie: I think you are now solving your homemade problems . . . System and Firewall have no availability at all Response has 16 A 6 Agent has 18 |
Negative:
The system does not question admin actions. The system can only verify that it is an admin. The system can not find out whether an action is appropriate for the overall situation or not. Thats why any actions performed by an admin will never be hacking actions.
If you hack yourseelf root access, you are root. The system never questions root. It only verifies that you are really root.
| QUOTE (blakkie) |
| Actually in the core book an Agent 6 doesn't even exist (check at the back in the gear section). |
| QUOTE (Serbitar @ May 8 2006, 12:18 PM) | ||
page ? paragraph ? |
| QUOTE |
| Negative: The system does not question admin actions. |
So to sum things up:
Comlink all 6
6 Analyze
3 Agents 6
Encryption 6
is a thing which most likely every Runner worth his salt will have, given the cost and availabilities in the book. Nothing of these is even restricted, you can walk into a shop and just buy it. Thus any matrix rules, or interpretation of the rules, must cope with this fact and take it as a quasi baseline.
As to monitoring system logs: It is right there in my example. It has been there from the start.
umm.... isn't hacking on the fly 1 IP not, 1 turn?
one small thing about admin accounts. in windows today you can remove the default admin accounts access to anything if so wanted. basicly is just another account, but as default it have higher access then the rest of them.
therefor its possible that even with a admin account you can run into files and other objects that you have no legal access to. now there are some safeguards buildt in, like say a admin can take ownership of something. but he cant give it back, so it will be noticed if its not supposed to be done unless asked for or orderd.
hell, there is a "crasy" security system being put into use for linux, developed by the NSA. its called SElinux. and with that, even if i log in as root i may not have all the powers one would normaly expect. i dont fully understand its full range of abilitys myself, but it seems one can vary the access rights based on if the root account is accessed localy or remotly, among other things.
so in many cases there would still be things one could not do, even with a admin account, when logged in remotely.
hmm, now that i think about it there was a story in a book i read, or maybe a web article, where the only way to gain full unrestricted admin access from a terminal was by having that terminal connected on the correct port on the network.
now the makers of this system was showing it of at some industry gathering, and was offering a money price if anyone could crack it, so sure of its safety they was.
but someone did in the and crack it. by waiting for the techies to walk away for a coffe break, leaving some sales zombie there. then one person distracted that zombie, while another picked the lock of the networking locker, flipped some wires over, created a secondary admin account or something like that, flipped the wires back, relocked the locker and waited for the techs to return. then he walked up to a terminal, enterd into the admin account and called the techs over so they could see
end of the day he walked out of there with the cash.
as the name of the person? kevin mitnick
@Virus
I will check that
@hobgoblin
sure, there may be the ocasional account called "admin" or "root" that can not do anything in some system. But there is allways an account, that can do anything. Just call this one admin, and the rest security.
After all its just a matter of naming. For sake of simplicity, at least.
| QUOTE (Serbitar @ May 9 2006, 07:22 AM) |
| @hobgoblin sure, there may be the ocasional account called "admin" or "root" that can not do anything in some system. But there is allways an account, that can do anything. Just call this one admin, and the rest security. After all its just a matter of naming. For sake of simplicity, at least. |
Those are extreme exceptions. They do not have to be covered by rules, as long as they stay just that, exceptions.
Blakkie That does notin any way model Real Life computing systems
Now considering that the SR4 wireless change was supposed to add realism
The closest I have seen to a system with admin being limited was quite simply one where nousernames were assigned to the Root
You could still hack root access withan exploit
At the last Ruxcon (big Hacker convention in Sydney Australia) the winning time for a particular hack contest for such a system was 12 seconds
| QUOTE (Kremlin KOA @ May 9 2006, 11:19 AM) |
| Blakkie That does notin any way model Real Life computing systems |
there is a reason why NT is not normally used for large networks
besides which with NT all the major hacking (SR) actions can be done on an account with full priveledges
even crash (BSoD) although on NT it might take a hacking action
UNIX and LINUX systems, which are more secure, do allow root to access the kernel
oh and IRL NT does have a level of account which can access the kernel, it is just only supposed to be available to microsoft personnel
NT has been used in every large network I've encountered including two colleges, a 1500 employee (~1200 workstations) company, and a 110,000 employee company (with who knows how many workstations).
In the classified lab I worked in NT was used for some stuff and linux was used for others. The choice was made based on programmer's personal preference and software of choice.
interesting
was going on US and Aus national statistics
most of the large networks in te US are UNIX or Linux(I think 75% or so between them circa '99)
the rest are wither MACos (rare as hen teeth) or NT
I can only speak from personal experience, not having worked in 75% of the companies in america and Australia. I'd be interested in seeing a source for that statistic, given how easily manipulated statistics can be. You'd probably get different numbers if you talked to Microsoft then you would if you queried a BBS populated by *NIX gurus.
the aussie ones were supposed to be Australian Bureau... not sure if the US ones were as reliable.
It makes sense, as it is only a recent development for networ hub machines to be PCs as opposed to dedicated unix servers
Those are also 1999 statistics, which mean next to nothing now. I'm not saying it's wrong, just that tossing out a 7 year old number from partially unknown sources is far from being evidential.
evidential it is
Absolue proof it is not
(sorry , the distinction between those is a pet peeve)
my major point was that the standard 'admin' account in NT is not what SR is calling 'admin' that is more like a security account
Ok, I suppose you could call it evidence. It's possible that it is false evidence, and it's definitely out dated evidence. But if you want to be technical, then the guy I pay $5 to so he'll say I was with him playing video games all night instead of out robbing liquor stores also constitutes evidence.
| QUOTE (Kremlin KOA @ May 9 2006, 12:26 PM) |
| besides which with NT all the major hacking (SR) actions can be done on an account with full priveledges |
| QUOTE |
| even crash (BSoD) although on NT it might take a hacking action |
| QUOTE |
| oh and IRL NT does have a level of account which can access the kernel, it is just only supposed to be available to microsoft personnel |
After some thought I decided to skip my "no subscrpition" interpretation of the rules, for compatability. The subscription rule can always be bypassed by simply sniffing the traffic to a node and then spoofing the ID. This does simply add just another two dice rolls to any decent security network, but what the heck . . .
In my next text I will give an example of how to prevent unlimited "network relaying" for infinite security.
Comments: Assumptions 1-2 from my previous examples still apply.
TODAY: Hacking through a relay of linked nodes
It was discussed a couple of times: What can be done against a network where several nodes are linked, using the subscriber rule, together to prevent, or delay, hacking.
A very good example would be this:
A runners has a main comlink A, he uses for normal communication, and 5 "relay" comlinks B,C,D,E,F. Only comlink F has wireless capability.
The runner uses his main comlink to communicate, comlink B only accepts input from A and C, comlink C only accepts input from B and D and so forth:
A - B - C - D - E - F - WiFi-World
To get to A, a hacker has to hack B,C,D,E, and F first.
But then, in SR4, everything has a device rating. Even our clothes are nodes, as they have built in climate control and such. They might only have a device rating of 1, but they would also have to be hacked. So the runner could do the following:
A - B - C - D - E - cyberleg - smartgun - trousers - jacket - glasses - F - WiFi-World
This is perfectly acceptable under standard SR4 rules, and the first example isnt even unlogical, but a very sensible thing to do.
So what to do about this? Just let hackers go through everything?
I propose a rules interpretation that circumvents possible dice orgies, is fast and understandable:
A by using Spoof a hacker can disguise as a data packet and exploit a node to relay him to his destination. He needs the network ID of the host he wants to be relayed to. If he wants to also spoof the ID he originated from, he can do so in a separate test.
Every host, that the hacker is being relayed to, may roll against the spoof test with System+Firewall If the hacker has at least 1 net success, he is relayed to the next host in the chain, or he may chose to hack into the node that is relaying him using normal "hacking on the fly" procedures. In both cases he may choose to analyze the node to get information about the system ratings only. If he does not have any net successes, he may decide to immediately hack the node in question using standard "hacking in on the fly" procedures, use legit access rights to access the node, or be catapulted back to the node he started the spoof attempt from. When he is relayed to his destination, he may hack into the node on the fly, or access it with legit user rights.
Note that if the relay host, scores any net hits in the opposed test, it has detected that something is wrong and may launch security measures.
(H) Hacker:
Hacking: 5 (specialization stealth)
Computer: 5
Hot-SIM: +2 dice
Firewall: 5
Response: 5
Firewall: 5
Signal: 5
Loaded programmes:
- Exploit 5
- Analyze 5
- Spoof 5
- Sniffer 5
(C1) Comlink 1:
Firewall: 6
System: 6
Signal: -
Response: 6
(C2) Comlink 2:
Firewall: 1
System: 1
Signal: -
Response: 1
(C3) Comlink 3:
Firewall: 3
System: 3
Signal: -
Response: 5
(C4) Comlink 4:
Firewall: 6
System: 6
Signal: 6
Response: 6
Network architecture:
C1 - C2 - C3 - C4 - WiFi-World
Steps:
(bold steps denote the minimal version of this example)
(H) Sniffing Traffic
(H)Matrix Perception
(H) Spoofing relay
(C4) Detecting relay spoof
(H) Analyze action
(C3) Detecting relay spoof
(H) Analyze action
(C2) Detecting relay spoof
(H) Analyze action
Explained:
(H) Sniffing Traffic
Hacking+Sniffer: 5+5+2 = 3
The hacker wants to hack into Johnsons comlink. He knows Johnson is extremely paranoid and might have several layers of relay comlinks. He phones the Johnson to give a status report. As he does not want to hack into the MSPs database to get the node ID that is correlated to the Johnsons phone number, he is simply monitoring the traffic going from the MSP to the Johnson. To interfect the traffic he has to succeed in a Hacking+Sniffer test. With 3 hits, he easily intercepts the traffic.
Note: If the traffic was encrypted it had to be decrypted first.
(H)Matrix Perception
Computer+Analyze: 5+5+2 = 2
To get the ID out of the traffic, the hacker has to succeed in a simple matrix perception test.
(H) Spoofing relay
Hacking+Spoof: 5+5+2 = 5 hits
Now, the hacker wants to hide as a communications data package. He spoofs the ID of such a package and virtually knocks on the door of the Johnsons gateway host C4.
(C4) Detecting relay spoof
System+Firewall: 6+6 = 4 hits
The C4 chokepoint comlink scans the traffic for validity before relaying it. It achieves 4 hits in its test, which leaves the hacker with 1 net success. The node automatically relays the "hacker package" down the subscriber line.
(H) Analyze action
Hacking+Analyze: 5+5+2 = 2 hits
The hacker wants to know what node he is being relayed through. He rolls only 2 hits and goes for System and Firewall attributes. The GM tells him that both are 6. With a "holy shit" on his virtual lips the hacker is relayed to the next node.
(C3) Detecting relay spoof
System+Firewall: 3+3 = 3 hits
The C3 relayhost comlink scans the traffic for validity before relaying it. It achieves 3 hits in its test, which leaves the hacker with 2 net success. The node automatically relays the "hacker package" down the subscriber line.
(H) Analyze action
Hacking+Analyze: 5+5+2 = 3 hits
The hacker wants to know what node he is being relayed through. He rolls 3 hits and goes for System, Firewall and Response attributes. The GM tells him the ratings. The hacker is mumbling "getting better" while he is relayed to the next node.
(C2) Detecting relay spoof
System+Firewall: 1+1 = 1 hit
The C2 relayhost comlink scans the traffic for validity before relaying it. It achieves 3 hits in its test, which leaves the hacker with 2 net success. The node automatically relays the "hacker package" down the subscriber line to C1.
(H) Analyze action
Hacking+Analyze: 5+5+2 = 3 hits
The hacker wants to know what node he is being relayed through. He rolls 3 hits and goes for System, Firewall and Response attributes. The GM tells him the ratings, which are 1,1,5. The hacker thinks "big mistake" and notes the ID of this node. He might hack in here later to get some admin privileges and install a backdoor right in the Johnsons subscriber line.
The hacker is then relayed to the final C1 comlink, where he may try to hack in, with an Hacking+Exploit (6, 1 Phase) extended test.But his best choice is to do the whole procedure again and hack, the weak C2 comlink, get some admin privileges and then sit there and probe the hell out of the heavily fortified C1 comlink to avoid detection in his exploit attempt.
Forgive me for not reading every page...but I can't seem to find how clean out your net hits from a system before logging off so you don't leave a data trail. I looked in the book, and perhaps I'm just passing it by but I can't seem to find how to do it..so could somebody please tell me or direct me to a page number so that I can figure this out.
Its not in there . . . Thats the overall problem of the matrix rules with the basic SR4 book. Everything is left to the GM. Im trying to fill the gap by giving some ideas, but thats just it.
So here you go: (btw, you do not clean net hits, but hits. If the node had any net hits, you wouls have been detected).
You can erease all the traces of your hacking activities you left in the node, by editing the log files. Admin previliges are needed for this if you do not have them, you have to hack).
This is an extended: Computer+Edit (1, 1 combat turn) extended test. Every hit deletes "edit programme rating" hits worth of traces you left behind.
If you do not have the priviliges it is an opposed Hacking+Edit vs System+Firewall(1, 1 Combat turn) extended test. Note that this test also generates hits for the node, tht have to be cleaned up.
If you clean everything up, nobody can find out by looking at that system logs, that it was hacked. (Of course, one might tell that the system is hacked when the node does wiered things, but you will just not find it in the logs). If any hits are left behind, one can find the hackers matrix ID (just like modern day IP number) in the logs and what he did. Note that the matrix ID can be spoofed and such.
Ok thanks, that clears things up except 1 thing...which I might be reading it wrong. Is it the hits the hacker scores that he must clean...or the hits the system scores that the hacker has to clean?
Where does it say you need to clean hits? I'm not finding anything like that.
@Loestal:The hits the system scores.
@Aaron:You do not need to clean hits. I am simply giving hints on how such a system can work. The book (RAW) says, that hack attempts can be found. But it gives no rules how this is decided and what a hacker can do against it. It is up to the GM till unwired is out. I am just giving suggestions on how to do it.
So once more: Thes rules I give in this thread are my interpretation of the matrix rules. Nothing should (to my knowledge) contradict the rules given by RAW, but I am adding a LOT of assumptions and extra stuff on how things COULD work.
I just want to give examples of how to model a working matrix ruleset covering various situations that is consistent and understandable.
Powered by Invision Power Board (http://www.invisionboard.com)
© Invision Power Services (http://www.invisionpower.com)