If this sort of thing has been asked before, would someone be so kind as to point me in the general direction of the thread?
When I first started reading the rules and making characters, the whole drone rigging and hacking/stealing drones sounded like it had a lot of potential. Unfortunately, I am having trouble understanding how it's supposed to work. Can someone step me through the process(es) of taking over another rigger's drone?
Is a device considered the same as a node? So we could find wireless node in hidden mode, and then hack into it? Then what would we do while we were there? You can't jump into it that way, but you could give it orders, right? Including accepting our rigger's signal? And if we've hacked the device, then our icon is in that node. If the rigger is jumped into it, would he be able to do anything about you? Would his icon be there, and able to be crashed?
Or Could we simply intercept the wireless traffic, and then edit it, making the drone accept your own rigger signal, and not accepting its original controller's?
If you can spoof the drone into accepting your signal, does the owner have any way of knowing you're there, besides seeing what it does?
Does any of this make sense? What am I missing?
http://forums.dumpshock.com/index.php?showtopic=12775&hl=drone
Yes, a drone is a node.
Thanks Aaron. That helps.
I find the commlink of the controlling rigger (though various routes), and do an analyze to determine his ID (I don't have to hack in, just watch him?). Then, I can use that to spoof orders to the drone, and tell it to recognize my rigger, instead of its owner. Then we fly. Not real quick, but it sounds easy.
But what about directly hacking into a drone? It seems like that would be easier. You have to locate the hidden node/drone. Then hack in. Then you just edit the subscription list (after defeating the IC). Does the rigger have any recourse to your actions, once he learns you're in there?
| QUOTE (wind_in_the_stones) |
| I find the commlink of the controlling rigger (though various routes), and do an analyze to determine his ID (I don't have to hack in, just watch him?). Then, I can use that to spoof orders to the drone, and tell it to recognize my rigger, instead of its owner. Then we fly. Not real quick, but it sounds easy. |
| QUOTE |
| But what about directly hacking into a drone? It seems like that would be easier. You have to locate the hidden node/drone. Then hack in. Then you just edit the subscription list (after defeating the IC). Does the rigger have any recourse to your actions, once he learns you're in there? |
| QUOTE (Aaron) |
| It's that darn subscription list that prevents that in the first place. Sure, you could locate it, but it's set to respond only to its owner's commlink, and will ignore your attempts to connect to it to hack your way in. Once you're in, assuming you've altered the subscription list so it only responds to you, he'd have to do the same things you did to get it back. |
| QUOTE (Aaron) |
| Oh, while I'm posting and thinking about it at the same time, if you're facing an adversarial rigger that has jumped into a drone, hit the drone with a directional jammer. Assuming he's far enough away, that will not only knock him out of the drone, but give him dumpshock, too. |
Anyone else want to jump in here?
Now what about drones?
The table on p. 212 says crawler drones generally have a signal rating of 4. The drone chart in the back of the book gives pilot ratings (3) - is that the same as System? (Which limits the size of the programs that the drone can run.) What about firewall? If pilot is not the same as system, and there's no mention of drones coming with firewall, then does that mean we've got to buy an OS (or jsut the programs - table p.228) for each drone? Or do we assume the firewall is the same as the pilot?
| QUOTE (wind_in_the_stones) |
| Anyone else want to jump in here? Now what about drones? The table on p. 212 says crawler drones generally have a signal rating of 4. The drone chart in the back of the book gives pilot ratings (3) - is that the same as System? (Which limits the size of the programs that the drone can run.) What about firewall? If pilot is not the same as system, and there's no mention of drones coming with firewall, then does that mean we've got to buy an OS (or jsut the programs - table p.228) for each drone? Or do we assume the firewall is the same as the pilot? |
Okay, that was one of my theories - that the pilot rating is similar to the device rating, which means that all stock traits are 3. (Too bad the BBB doesn't say so. You just have to piece it together from various parts of the book.)
So my drone's broadcast signal is 400 meters.
Thanks, Jaid!
Okay, I've got another question.
1. Find the controling rigger - Detect hidden node
2. Decrypt it.
3. Get the rigger's broadcast ID - Analyze
4. Use the ID to command the drone to unsubscribe the original rigger, and give it whatever orders you want, including subscribing a new rigger.
Do I have to Scan to locate the drone so I can spoof it?
1. detect the drones node
2. intercept traffic
3. decrypt traffic
4. analyzeID (the ID must be in the traffic)
5. spoof command with ID
or
5. spoof your ID with ID
6. hack into the drones node (try admin acces to fully overtake it)
| QUOTE (Serbitar) |
| or 5. spoof your ID with ID 6. hack into the drones node (try admin acces to fully overtake it) |
question- what if the rigger is 'jumped into' the drone in full VR? how would that affect your attempt to hijack a drone? Even with 3 actions a turn from hot sim, one has to be spent on a complex action to pilot.
would this simply resolve as cybercombat? and if you crash the rigger's commlink, what happens to the drone in that time between rigger going offline, and hacker spoofing control?
along this train of thought, what if a rigger is physicaly in a vehicle which could be piloted remotely? just turn the commlink port off?
| QUOTE (wind_in_the_stones) | ||
If you're talking about hacking into the drone, I believe the steps would be: 1. Detect node (drone) in hidden mode 2. Hack in at admin level 3. Give it new orders 4. Deal with IC or whatnot Yes? No? |
| QUOTE (Teulisch) |
| question- what if the rigger is 'jumped into' the drone in full VR? how would that affect your attempt to hijack a drone? Even with 3 actions a turn from hot sim, one has to be spent on a complex action to pilot. would this simply resolve as cybercombat? and if you crash the rigger's commlink, what happens to the drone in that time between rigger going offline, and hacker spoofing control? along this train of thought, what if a rigger is physicaly in a vehicle which could be piloted remotely? just turn the commlink port off? |
| QUOTE (Serbitar) |
| No, they are the steps given above 1-6 using the lower 5/6. Thats why I wrote them. |
| QUOTE (Teulisch) |
| question- what if the rigger is 'jumped into' the drone in full VR? how would that affect your attempt to hijack a drone? Even with 3 actions a turn from hot sim, one has to be spent on a complex action to pilot. |
| QUOTE |
| what if a rigger is physicaly in a vehicle which could be piloted remotely? just turn the commlink port off? |
I think that I'd prevent a hacker from hacking a currently rigged drone. The drones software is overridden by the impulses of the rigger.
Alternatively one could rule it as a cyber combat test instead... Just throwing it out there ^^
I don't think it would be overriden, exactly. It's just that the programs that are loaded (pilot, clearsight, etc.) would not be in use.
Cyber combat? Like assuming that the rigger's icon is occupying the node, so the hacker has to fight him? But if the rigger's icon is there, that means he's watching the node, not the drone's surroundings.
It would make more sense for the rigger's icon to be there if he's on the subscription list, and issuing commands to the drone. But a hacker's icon doesn't have to be in a drone in order to command it.
| QUOTE (wind_in_the_stones) | ||
I know, but that doesn't make any sense to me, so I replied with something that does make sense to me. So I'll be more specific. You said... 1. detect the drones node 2. intercept traffic 3. decrypt traffic 4. analyzeID (the ID must be in the traffic) 5. spoof your ID with ID 6. hack into the drones node (try admin acces to fully overtake it) I didn't know what you meant by "spoof your ID with ID". I guess you meant make the drone think that you have the proper ID (I would call that "spoofing the drone" but that's just my terminology, I guess.) Aside from that, you have things just a little bit out of order. decrypting must be done before intercepting (p225). |
| QUOTE |
And detecting the drone's node doesn't have to be done until just before the... oh. |
| QUOTE |
If you're hacking, you don't need ID and spoofing. You only need the ID if you're going to try and fool the drone into accepting your commands. If you're hacking, you just detect the drone's node and attack it. So that brings us back to my steps 1-4. |
| QUOTE |
It sounds like we basically agree on the spoofing style of hacking. |
| QUOTE (Serbitar) |
| yes, you are right. Still thats kind of counter intuitive . . . (how can you hack something you havent intercepted?) |
| QUOTE |
| After you intercept traffic there is no need to detect the node, you already know its Access ID because of the traffic interception and decryption (all the protocol data must be in the traffic). |
| QUOTE |
| No, if the drone is subscribed to the other riggers comlink (whch everybody will do) you have to spoof your ID. |
You can not hack into a node that is not accepting your traffic. Thats what subscribing does and thats why you have to spoof your ID to hack in.
This issue has been discussed numerous times in this forum. Just do a search.
| QUOTE (Serbitar) |
| You can not hack into a node that is not accepting your traffic. Thats what subscribing does and thats why you have to spoof your ID to hack in. This issue has been discussed numerous times in this forum. Just do a search. |
Can't find anything in a search. "hacking" turns about a third of the posts here, and adding one more word turns up no results.
I'll reiterate. Neither detect hidden node, nor hacking on the fly refers in any way to using ID. And if you have ID, you don't have to hack. That's why they call it hacking. Notice also, that p222 says that once a hacking hacker is inside the node, he can do anything that an authorized user can do - it doesn't say anything about having to spoof. So if spoofing requires ID, then why would hacking also require ID, when it doesn't require spoofing?
People may have discussed it, but there are no rules as written that back up that theory.
isn't hacking a drone and crashing it a viable option? that is without going through the commlink first? i'm unconvinced you have to go through a subscribed drones characters commlink to do everything.
it seems to me the linking and subscribing action is to keep out random or accidental access, not make something unhackable.
plus wind, here's at least one of the threads: http://forums.dumpshock.com/index.php?showtopic=11835&hl=hacking,and,drones&st=0
| QUOTE (Dr. Dodge) |
| isn't hacking a drone and crashing it a viable option? that is without going through the commlink first? i'm unconvinced you have to go through a subscribed drones characters commlink to do everything. |
Is that God Save the Queen by the Sex Pistols?
| QUOTE (Aaron) | ||
Perhaps this will help convince you. I'd like you to find someone you know and/or trust, and ask them to do a little practical exercise with you. The goal is for you to instruct them to make a peanut butter and jelly sandwich. Make sure that the peanut butter is creamy (anything else isn't real peanut butter), but the jelly could actually be jam or preserves. In fact, construct a small flowchart of options for the jelly, asking questions of your friend like the time of day and the like; the specifics aren't important (except the peanut butter type), the point is that this represents the giving of instructions and queries from the hacker (that's you) to the drone (that's your friend; if it's not a friend, we'll just say he or she is for now). That would be normal interaction with a drone. Next, insert an instruction to chuck the ingredients into the garbage disposal. If you have no garbage disposal, remove the word "disposal" from the equation. If you have no garbage, I don't want to talk to you anymore. If the person you are performing this exercise with is not actually a friend, feel free to insert instructions to stab himself or herself in the nostrils with the knife. This simulates the attack program giving conflicting and destructive input to the target drone. Now, have your friend put his or her fingers in his or her ears, shut his or her eyes tightly, and hum "God Save the Queen" very loudly. Actually, it could be "Ozar Midrashim" by Information Society for all I care; it doesn't matter what the song is, as long as the humming is loud. Have him or her only listen to instructions that come from your mom (be sure to tell him or her this before he or she starts the humming). Now, try the above exercises again. Get anywhere? No? How about when you pretend that the instructions come from your mom and actually convince your friend (or whatever) that this is the case? Hope that helped. |
| QUOTE (Dr. Dodge) |
| how could my friend listen to my mom (or anybody?) if he's humming real loud with his fingers in his ears? does the fact that i told him to give him this ability? |
| QUOTE |
| and why would an analogy for attack involve giving orders? do you give orders to another icon, OS, my mom etc. when you attack them in (cyber)combat? I thought it was that "Attack programs are hostile code carriers that attempt to kill processes, introduce random input, create buffer overflows or program faults, and otherwise make a program/icon crash." What I am wondering is, do you have to go through the commlink of a subscribed drone in order to crash(OS) it? |
| QUOTE |
| if subscribed drones are immune to hacking, is there a pressing need for firewall for them? |
| QUOTE |
| so basically, what i'm trying to be convinced of, is that spoofing is the only way to deal with drones. |
So you tell your friend, "I'm going to tell you how to make a sandwich, and what to do with it, and you can't listen to anyone but me." And then the neighbor kid comes in, disguised as you and says, "give me the sandwich." And your friend does. That's spoofing.
But when the neighbor kid comes in, trips your friend, grabs the sandwich and runs, that's hacking.
Two completely separate ways of compromising a drone.
And firewall is your defense against hacking. In answer to your specific question (sort of), you do have to go through a drone's wirless connection. But with hacking, you're not talking with it (which would require a subscription, real or faked), you're trying to fry it.
| QUOTE (Aaron) |
| it's just that you have to spoof your ID every time you try your Exploit or your Attack. |
| QUOTE (wind_in_the_stones) |
| But when the neighbor kid comes in, trips your friend, grabs the sandwich and runs, that's hacking. |
| QUOTE (wind_in_the_stones) | ||
Show us the rules. Explain. Please. I've been waiting for two weeks for someone to justify this using the RAW. |
| QUOTE (Boyle et al. 212) |
| Now, just because all of your devices can talk to other devices doesn’t mean that they will. For simplicity, privacy, and security, you may confi gure your devices so that they only interact with another specific device (usually your commlink, as your PAN’s hub) or a specific network (your PAN). This prevents confusion between users (am I accessing my guncam or yours?) and also offers a degree of protection from snoopers and hackers. Rather than allowing any stranger access to all of your electronics, anyone that wants to interact with your PAN must connect to your commlink first. |
| QUOTE (Boyle et al. 221) |
| Note that agents and drones will only take orders from their controlling persona, unless another persona spoofs an order (see Spoof Command, p. 224). If the controlling character chooses, he can instruct the agent or drone to receive orders from other specified personas. |
| QUOTE (Boyle et al. 238) |
| To manipulate a drone, you must first have accessed it and linked to it as a subscriber (see p. 212). |
| QUOTE (Boyle et al. 224) |
| To spoof commands, you must beat the agent or drone in an Opposed Test between your Hacking + Spoof and the target’s Pilot + Firewall. |
| QUOTE (Boyle et al. 238) |
| Riggers also don’t usually spend the time or money to buy up or program their own top-notch hacking utilities, preferring instead to focus on a good Signal strength, good Scan, Command, Encrypt, and Sniffer programs, and of course, plenty of drones with amped Pilot, Response, and Firewall attributes of their own. |
That makes perfect sense and definitely seems to follow the RAW. So is there a reason other than money to not fill a commlink full of IC designed to verify your commands then duct tape the thing to the back of the drone and plug that bad boy in with fiber optics, leaving your drones brain (presumably also a commlink or something like it) free for autosofts and the like?
Or do commlinks not have more than one type of 'on' when it comes to being wireless? Can you set a commlink to only act as a relay for drone commands without allowing it real wireless networking access? By the rules I mean, obviously it is possible logically. I get radio on my computer but I not exactly concerned about catching a virus from it.
Thanks, Aaaron, thats the way I would quote RAW to justify my rules interpretation, too.
Aarons RAW interpretation is correct as long as you want to SPOOF a command, there are other ways as well.
Let's assume that we cannot find the persona of the owner so we cannot spoof, then we do the next best thing.
We locate the wireless signal and insert fake orders and/or give it new files to upload or shutdown commands.
Hacking a drone by accessing it's wireless signal is also viable since a drone is an OS in itself, the pilot program is an OS and can therefore be hacked like any commlink.
Spoofing would only be needed if you want to fake being the real user, as long as you sit with your stealth program and being a hacker intent on hacking the drone system then spoofing command will not be needed.
Intercepting Wireless signal: SR4 page 225.
The sentences Aaron has quoted is what I would take as a LEGAL way of accessing drones. For ILLEGAL ways when you CANNOT spoof it you can always hack it and sneak into its system, then you replace its subscription list so that YOU are the controlling persona. Intercepting the signal from the controlling user to the drone and editing the infrmation is also a tactic.
Spoofing is just the simplest way, there are always more than one way of tackling a problem.
| QUOTE (aaron) |
| This has been left as an exercise to the reader (HINT: it involves having your mom tap your friend on the shoulder so he or she looks to see if it's really her). |
| QUOTE |
| Here's a question for you: which processor kills the processes, takes the random input, has the overflowing buffer, and finds the program faults? (HINT: It's the target's processor.) Okay, that wasn't really a hint, but the point is it's still the target processor that gets proverbially narfed hardcore. Consider, if you will, a bit of malware that gets on your machine. It's running on your machine; if the processor isn't being made to screw up, it won't get screwed up. In order for a processor to do anything, it needs instructions. In order for a processor to suffer hardcore narfage (proverbial or otherwise), it needs to receive malicious instructions, as with your (ex-)friend stabbing himself or herself in the nostril. |
| QUOTE |
| At the risk of telling you that you are wrong again, you're wrong again. Jammers are quite effective against drones that are being directly controlled by their rigger owners. An anti-vehicle rocket or a high volume of fully automatic fire works nicely, too. Spells involving electrical effects can do a number on a drone, too. |
| QUOTE (Serbitar) |
| Thanks, Aaaron, thats the way I would quote RAW to justify my rules interpretation, too. |
| QUOTE (The Jopp) |
| We locate the wireless signal and insert fake orders and/or give it new files to upload or shutdown commands. |
I have no idea what "snarky" is . . .
Snarky == sarcastic. I wasn't sure whether you were being sarcastic or not. That time or this one, for that matter.
>>> Edit: http://www.urbandictionary.com/define.php?term=snarky explains it way better than I do. First hit on Google for "snarky," too.
| QUOTE ((Boyle et al. 212)) |
Now, just because all of your devices can talk to other devices doesn’t mean that they will. For simplicity, privacy, and security, you may confi gure your devices so that they only interact with another specific device (usually your commlink, as your PAN’s hub) or a specific network (your PAN). This prevents confusion between users (am I accessing my guncam or yours?) and also offers a degree of protection from snoopers and hackers. Rather than allowing any stranger access to all of your electronics, anyone that wants to interact with your PAN must connect to your commlink first. |
| QUOTE |
| "In game terms, your persona maintains a subscription list of nodes that you are accessing and that are allowed to establish communication with you. The subscription list may be unlimited in size, but the number of nodes, agents, or drones that a persona may actively subscribe to (access) at any one time is limited to the persona’s System x 2." |
| QUOTE ((Boyle et al. 221)) |
Note that agents and drones will only take orders from their controlling persona, unless another persona spoofs an order (see Spoof Command, p. 224). If the controlling character chooses, he can instruct the agent or drone to receive orders from other specified personas. |
| QUOTE ((Boyle et al. 224)) |
To spoof commands, you must beat the agent or drone in an Opposed Test between your Hacking + Spoof and the target’s Pilot + Firewall. |
| QUOTE ((Boyle et al. 238)) |
Riggers also don’t usually spend the time or money to buy up or program their own top-notch hacking utilities, preferring instead to focus on a good Signal strength, good Scan, Command, Encrypt, and Sniffer programs, and of course, plenty of drones with amped Pilot, Response, and Firewall attributes of their own. Note the lack of mention of Analyze or IC in the last quote. |
| QUOTE |
| If that's not good enough for you, then we'll have to wait for the next rigger book. Meanwhile, feel free to GM your own game and run it any old way you want. =) |
| QUOTE (Dr. Dodge) |
| You use Analyze to make a matrix perception tests (p.217) which is necessary for spoofing (p.224) so if anything this supports the hack-the-drone angle. IC is casually mentioned elsewhere (top of 223) |
| QUOTE (Aaron) | ||
Perhaps this will help convince you. The goal is for you to instruct them to make a peanut butter and jelly sandwich. Make sure that the peanut butter is creamy (anything else isn't real peanut butter) |
| QUOTE (Shinobi Killfist) | ||
And that's the point where anyone who knows peanut butter insults your masculinity. Creamy peanut butter what's next milk chocolate or fru fru bevrages, or how about the unholiest of unholies sweetened ice tea.(man how can a region that gave us biscuits and gravy give us that) |
| QUOTE (Aaron) | ||
You also use Analyze to detect intrusion attempts (Boyle et al. 221). It's the first line of defense against Exploit use. I consider it to be the best, since detection leads to alert, and an alert gives a free +4 bonus to a node's Firewall, and can activate IC. Neither Analyze or IC are listed among the preferred programs of the rigger on page 238, which indirectly argues that they are not as important as the programs that are listed. That was my point. |
| QUOTE (Aaron) | ||||
Look, what's the first step in making peanut butter? Crush up the peanuts (remember that song?). If there are peanut chunks in the peanut butter, it is, at worst, impure because stuff has fallen into it, and at best unfinished. Dunkelzahn would have agreed with me. |
| QUOTE (Dr. Dodge) |
| Alright. I guess I'm thinking of using analyze in an offensive posture and you're describing it in a defensive posture. But you still need it to spoof. And if spoofing is the only way to affect a subscribed drone, why would it not be listed? In the hack the firewall approach, analyze is unnecessary. |
Now, just because all of your devices can talk to other devices doesn’t mean that they will. For simplicity, privacy, and security, you may configure your devices so that they only interact with another specific device (usually your commlink, as your PAN’s hub) or a specific network (your PAN). This prevents confusion between users (am I accessing my guncam or yours?) and also offers a degree of protection from snoopers and hackers. Rather than allowing any stranger access to all of your electronics, anyone that wants to interact with your PAN must connect to your commlink first.
This is about communication, not attacking. I consider the subscription list and ID to be like logins and passwords. You want to interact with my PAN, I must first let give you the password. If I don't, then you can try to hack into my comm.
Note also, that this is not a rules section, so much as it is giving a general description of how things work, so the player has an idea of what is going on in 2070. Slight difference - not as precise.
Note that agents and drones will only take orders from their controlling persona, unless another persona spoofs an order (see Spoof Command, p. 224). If the controlling character chooses, he can instruct the agent or drone to receive orders from other specified personas.
This describes spoofing. And I dont think there is any appreciable difference between my interpretation of the spoofing procedure, and yours.
To manipulate a drone, you must first have accessed it and linked to it as a subscriber (see p. 212).
Same deal. Manipulation is not the same as electronic warfare. Plus, to manipulate a drone after hacking it, you must have first accessed it (which you did, because you just hacked it), and linked to it as a subscriber. This part is irrelevant, because by the time you've accessed it, your icon is already inside it, so you're not a subscriber. Or could say that since you've hacked it, you can put yourself on its subscription list.
To spoof commands, you must beat the agent or drone in an Opposed Test between your Hacking + Spoof and the target’s Pilot + Firewall.
Again, spoofing is different than hacking.
Riggers also don’t usually spend the time or money to buy up or program their own top-notch hacking utilities, preferring instead to focus on a good Signal strength, good Scan, Command, Encrypt, and Sniffer programs, and of course, plenty of drones with amped Pilot, Response, and Firewall attributes of their own.
Note the lack of mention of Analyze or IC in the last quote.
I'm not sure they have to mention every possible improvement.
If that's not good enough for you, then we'll have to wait for the next rigger book. Meanwhile, feel free to GM your own game and run it any old way you want. =)
And you yours. ![]()
Negative. That's shooting the drone down and taking its commlink.
Okay, then I have no clue what that otherwise entertaining analogy was supposed to mean.
Anyway... Let's say you've logged in to Dumpshock. I track down your IP, and use it to log in there under your name. The forum thinks I'm you. That's spoofing. Now let's say that I don't mess with getting your info - I just hack the site. I can make it think I'm you or anybody else. That's hacking on the fly. I dont need to forge a password, I just brute-force my way in.
Edited: sorry the quote tags didn't work.
| QUOTE (Aaron) |
| They're not immune to hacking, it's just that you have to spoof your ID every time you try your Exploit or your Attack. |
| QUOTE (BBB p.222) |
| A hacker who has successfully broken into a node undetected can go about his business like any user with the appropriate account privileges. |
Mr. or Ms. wind_in_the_stones, riddle me this:
How could you hack, as you say, Dumpshock if the site ignores all of the network packets coming from you? How about if the site ignores all packets except those coming from me?
Hm. Y'know, it just occured to me that you may have a disconnect on how network communication works. In case you do, I'll explain it in a nutshell. In case you don't, I'll encapsulate it in a spoiler tag.
| QUOTE (Aaron) |
| Mr. or Ms. wind_in_the_stones |
| QUOTE |
| if it really was that easy to defeat a drone, why would riggers use them? |
| QUOTE (wind_in_the_stones) |
| Thanks for the info about network communication. Would you please explain hacking? And in game terms, what does hacking get you, as opposed to simply spoofing? |
| CODE |
| state service 22/tcp open ssh No exact OS matches for host nmap run completed -- 1 IP address (1 host up) scanneds % sshnuke 10.2.2.2 -rootpw-"Z1ON0101" Connecting to 10.2.2.2:ssh ... successful. Attempting to exploit SSHv1 CRC32 ... successful. Reseting root password to "Z1ON0101". System open: Access Level (9) % ssh 10.2.2.2 -l root root@10.2.2.2's password: |
| QUOTE (wind_in_the_stones) | ||
Sounds to me like you're trying to house-rule to cover a percieved game imbalance. |
Oh, I forgot to mention that some nodes you can simply start using Exploit on. These are the nodes that are looking for connections from the outside world, and have their functions severely limited by not being open to those connections. Such nodes include servers, libraries, garage door openers, vending machines, personal commlinks, taxi cabs, et cetera.
Drones, cop cars, cyberware, security cameras, weapons, and the like are all examples of nodes that would not be open to connections from the outside world, and would instead be subscribed (if not slaved) to a specific node.
now i have been told something interesting an that is when your trying to hack a drone (on the fly) your doing it AR which means it takes Days... to take complete control over a drone because of the subscription list? now the hack on the fly spoof you could issue basic commands like land or reboot and such but not anything like attack this target and Higher functions? also there are degradation on most programs that according to the book every run you do drops it by one point? so a hacker would be putting out like 80k to 100k+ per run to be on the bleeding edge program wise and rebuild wise? also come units are like fingerprints and you need new comunits every run or you may get caught by spiders on the net?
so how many runs should I be looking into per month to play keep up for this? your basic hacker / drone runner
thank you any commits would be helpful
Good explanation Aaron. I think I will have to add an explantion like this to my upcoming http://www.serbitar.de/stuff/SGM.pdf.
| QUOTE (Aaron) |
Now, look at the nmap output above. It shows that there is a port (a potential connection) in the target that is open and listening for input. If this port was closed, and no other ports open, sshnuke would not work, since the target could not execute the commands that sshnuke sent it because it would never get a chance to read them. If the router attached to the open port only allowed traffic through that was from a certain address, one would have to perform IP spoofing on packets in order to have the router forward the traffic and have sshnuke work; in game terms, one would have to Spoof the node in order to Exploit it. So the short answer (too late) is yes, you need to Spoof a node that is exclusively subscribed in order to use Exploit whether you do it the slow romantic way (Probing the Target) or the hard and fast way (Hacking on the Fly). In order to run the Spoof, you need to have a Matrix ID that won't get ignored, and to get that you either need to use Decrypt and Sniffer to get the ID from the traffic to and from the drone, or Track and Analyze to find the rigger in the Matrix and get the ID that way; this assumes that there is any traffic going to and from the drone (if they're not talking, you're kinda screwed). |
| QUOTE (Aaron) |
| Oh, I forgot to mention that some nodes you can simply start using Exploit on. These are the nodes that are looking for connections from the outside world, and have their functions severely limited by not being open to those connections. Such nodes include servers, libraries, garage door openers, vending machines, personal commlinks, taxi cabs, et cetera. Drones, cop cars, cyberware, security cameras, weapons, and the like are all examples of nodes that would not be open to connections from the outside world, and would instead be subscribed (if not slaved) to a specific node. |
| QUOTE (CrimsonHawk @ Jun 18 2006, 06:09 AM) |
| now i have been told something interesting an that is when your trying to hack a drone (on the fly) your doing it AR which means it takes Days... to take complete control over a drone because of the subscription list? now the hack on the fly spoof you could issue basic commands like land or reboot and such but not anything like attack this target and Higher functions? also there are degradation on most programs that according to the book every run you do drops it by one point? I'm not sure about the spiders finding you, either. |
| QUOTE (wind_in_the_stones) |
| [...] since my question remains - if you have an ID with which to spoof, why would you make an exploit test? |
| QUOTE (wind_in_the_stones) |
| Okay, this is important. This might answer my question. If that's the way things should work, the game designers really missed the boat on writing such a rule. That would have been a very obvious sentence or two. |
| QUOTE (wind_in_the_stones) |
| So we could say that any node that expects communication with outside entities will not have a subscription list, and therefore be vulnerable to an exploit. And that exploiting is useless against a subscribed one. |
| QUOTE (wind_in_the_stones @ Jun 18 2006, 11:10 AM) |
| [...] since my question remains - if you have an ID with which to spoof, why would you make an exploit test? |
| QUOTE (Serbitar) |
| To gain an account? ID = IP or mac-address exploit = gain an account And ID and a system account are two totally uncorrelated things. Even if my wirelss network is only accepting certain IDs, it will still check wheter the guy/device/node/whatever login on via this ID has a valid user/system/admin account. |
| QUOTE (Aaron) |
| Actually, they did say that, but you have to put together all of the stuff I quoted a few posts back. I suspect what happened was the same sort of thing that's happened before: the writers knew what they were talking about, the editors knew what the writers were talking about, and so it appeared that the whole thing made sense. |
| QUOTE (wind_in_the_stones) |
| But then I realized your first spoof command is going to be to add your rigger to its subscription list. And that's effectively an account. Or am I missing something? |
| QUOTE (wind_in_the_stones) | ||
And not only that, you knew what they were talking about, apparently. So you read a lot into those quotes from the BBB. I can't make them mean what you say they mean. Not without a stretch, anyway. They support my position at least as well as yours. |
So what happens when I delete the subscription list? Does the node default to an open status so just anybody hook up to the drone or is it basically offline?
| QUOTE (Navaruk @ Jun 18 2006, 11:53 PM) |
| So what happens when I delete the subscription list? Does the node default to an open status so just anybody hook up to the drone or is it basically offline? |
| QUOTE (Aaron @ Jun 18 2006, 12:13 AM) |
| If the router attached to the open port only allowed traffic through that was from a certain address, one would have to perform IP spoofing on packets in order to have the router forward the traffic and have sshnuke work; in game terms, one would have to Spoof the node in order to Exploit it. |
Aaron, in your game I agree that you could play it your way, as long as you have fun but according to the RAW one can use Spoof, Hacking and Intercepting wireless signals to try taking over a drone, they are not immune to hacking and electronic warfare and there’s nothing in the rules saying that you need spoof before you hack.
There are however several simple ways of stopping rampant abuse of the above – orders.
It’s stated in the book that Agents understand any order given although they could take them a bit too literally.
Here are the actions and what one can do to stop it.
1. It can only take orders from it’s controlling persona (Spoof can stop that)
2. It will double-check the order with the controlling personas log file if said order has been sent (spoof will NOT work because of that). Also, add an order to IGNORE commands that stops it from checking the logfile or changing the subscription list
3. Intercepting signal and inserting an order (Illicit editing action of data) will fool drone with fake orders inserted in the controlling personas datastream.
4. Point 1 can stop 3 from working since the hacker don’t have the original log file and cannot fake the correct order history (drone could have a log file from the persona with several days of history.)
5. Hacking the drone takes time and it is rare that a hacker would make an exploit test and rather hack on the fly – which gives the drone several attempts to discover the intruder.
6. Running an agent on the matrix on a standard node (citywide signal node or suchlike) and give it an order to peek inside the drones node (within the subscription list of the drone) would give it additional defense and save up slots for autosofts as well. It could run permanent analyze checks and have attack programs ready.
On another issue: Can I spoof command to an agent?
| QUOTE (Nim @ Jun 19 2006, 07:57 AM) |
| It's a minor nit, but since we're talking about wireless.... each node with a receiver has to run its own filter. A better real-world model for a subscribed node would be a server with ssh turned on, but a software firewall (ipchains, for example) configured to ignore connection attempts that don't come from a specific list of IPs. |
| QUOTE (The Jopp) |
| Aaron, in your game I agree that you could play it your way, as long as you have fun but according to the RAW one can use Spoof, Hacking and Intercepting wireless signals to try taking over a drone, they are not immune to hacking and electronic warfare and there’s nothing in the rules saying that you need spoof before you hack. |
| QUOTE (The Jopp) |
| Here are the actions and what one can do to stop it. 1. It can only take orders from it’s controlling persona (Spoof can stop that) |
| QUOTE (The Jopp) |
| On another issue: Can I spoof command to an agent? |
| QUOTE (Nim @ Jun 19 2006, 07:57 AM) |
| It's a minor nit, but since we're talking about wireless.... each node with a receiver has to run its own filter. A better real-world model for a subscribed node would be a server with ssh turned on, but a software firewall (ipchains, for example) configured to ignore connection attempts that don't come from a specific list of IPs. Unless you are maintaining that a subscription list is unlike a modern ACL, then what you propose would not work. The packet in question never even gets looked at, only the network header. Modernly, it reads bytes six through nine (for the source address), and that's it. |
| QUOTE (Aaron) |
I have to disagree. The RAW states that commlinks are also routers. This makes sense for a ubiquitous wireless network; it becomes very easy to run such a network if every device can pass packets. I'd assert that only a tiny fraction of traffic that a single commlink encounters would actually be for that commlink, rather than traffic to be forwarded. If that capability was integrated into the commlink's central processing duties, it would be a terrible waste of resources, especially when the user wants it for something processor-intensive (like gaming or decrypting or compiling or something). More likely, the router functionality is part of the wireless tranceiver (analogous to a modern computer's network card). |
| QUOTE (Aaron) |
| Oh, I forgot to mention that some nodes you can simply start using Exploit on. These are the nodes that are looking for connections from the outside world, and have their functions severely limited by not being open to those connections. Such nodes include servers, libraries, garage door openers, vending machines, personal commlinks, taxi cabs, et cetera. |
| QUOTE (Nim) |
| I didn't write the second paragraph of that, so I'm not sure where it came from. Is it part of your response, and accidentally inside the quote-tag? |
| QUOTE (Nim) |
| Actually, I agree with everything you've said here. I didn't intend to suggest that the filtering had to run on the main processor as opposed to a dedicated sub-processor...merely that it has to be done within the commlink itself, SOMEWHERE. It can't rely on a different node to do its filtering for it. And it can't be entirely hard-wired, because you need to be able to configure the contents of the list at run-time. |
| QUOTE (nim) |
| Only one of these I disagree on is the garage door openers. By design, a garage door receiver is intended to respond to only one or two dedicated transmitters. It's pretty much a perfect example of a subscribed node. Unless you meant a public pay-garage, rather than a home one? |
My http://www.serbitar.de/stuff/SGM.pdf of the whole situation. I tried to find a consistent solution that is sensible and does not violte SR4 RAW. Maybe somebody finds it interesting.
*grin* Good explanation. And yeah, this is getting pretty far afield, but I'm enjoying the conversation
What I was getting at, though, is that in a wireless network, the sender controls every aspect of the encapsulation. There aren't (or at least, needn't be) any intermediaries between the original sender and the final recipient. So, you can't trust the outer envelopes to be any cleaner than the inner message - the Bad Man sending the message could have fiddled with any layer of the network stack that he wanted to.
IF, and this is a big if, there's a vulnerability in the implementation of the ACL itself (it falls over when it receives a packet with a magic number of bits, or it stores the packet in a fixed-length buffer without checking the size first, or it does something similarly boneheaded), then you've got a problem. The reason it's a big if, though, is that that sort of thing is usually more compact and easy to debug than something like sshd would be. And if it's well-designed, then when it breaks it ends up passing NOTHING along, rather than everything, and you're inconvenienced but not compromised.
| QUOTE (Aaron) |
| Adding your ID to the subscription list just makes the target node stop ignoring you. But once you've been added, you can start Exploiting. |
| QUOTE (wind_in_the_stones) | ||
It seems to me, that if I'm on its subscription list, I can give the drone commands, and I no longer have to make spoof tests. Am I wrong about this too? |
| QUOTE (Nim) |
| What I was getting at, though, is that in a wireless network, the sender controls every aspect of the encapsulation. There aren't (or at least, needn't be) any intermediaries between the original sender and the final recipient. So, you can't trust the outer envelopes to be any cleaner than the inner message - the Bad Man sending the message could have fiddled with any layer of the network stack that he wanted to. |
| QUOTE (Nim) |
| IF, and this is a big if, there's a vulnerability in the implementation of the ACL itself (it falls over when it receives a packet with a magic number of bits, or it stores the packet in a fixed-length buffer without checking the size first, or it does something similarly boneheaded), then you've got a problem. |
| QUOTE (Aaron) |
| Meh. Maybe. I think you might be fishing a bit, though. |
| QUOTE |
| If "every aspect of encapsulation" is only controlled at the origin, it wouldn't work. Each end of the communication, and every step in between, has to be equally responsible for operating the proper network protocol (both routed and routing) or it don't work. |
| QUOTE |
While there doesn't have to be an intermediary between the sender and the receiver, it's faster if you're able to route your message through multiple routes at once. You gain a little bit in speed, and a lot more in security and error-checking. |
| QUOTE (Aaron) |
| You have to spoof it if you want it to follow a command. All being on the subscription list does for you is not have the drone ignore you out of hand. Once you're on the list, then you can start the Exploit or what have you. |
| QUOTE (Nim) |
| That's certainly true with wired communication, because the actual throughput on any given intermediary link may be lower than your own maximum rate of transmission. At that point, splitting the message across multiple routes will get the whole message there faster. In a wireless network, though, I don't see how adding addition intermediaries (assuming the sender and receiver are within clear trransmission range of each other) can do anything but slow the process down. Or am I missing something here? I'm honestly not JUST trying to be difficult. |
| QUOTE (wind_in_the_stones) |
| And back to my original question: what does it take to give control of the enemy drone to my rigger? Once I've hacked into it, I can transfer command rather easily, I'd imagine. Is it the same for spoofing? This seems like a simple decision, but I'd like to get someone else's opinion. |
So basically, you've got to hack it, and set up an account for your rigger. And take away the rigger's existing account.
Thanks a lot for your patience, Aaron.
| QUOTE (wind_in_the_stones) |
| So basically, you've got to hack it, and set up an account for your rigger. And take away the rigger's existing account. |
| QUOTE |
| Thanks a lot for your patience, Aaron. |
Powered by Invision Power Board (http://www.invisionboard.com)
© Invision Power Services (http://www.invisionpower.com)