Bear in mind that I'm new to SR4. I love how the Matrix rules have been streamlined compared to 2nd and 3rd Edition, but I'm just not 100% sure how to use them.
Let's say I want to hack into the node/nexus/site for Aztechnology's Magical R&D division, and I'm sitting in a local coffee house. How exactly -- in game terms and mechanics -- do I go about doing this? Let's assume I don't yet know the direct address to this site (for obvious reasons), and the site isn't in an isolated, wired, off-the-grid network.
dammit. I can look into this further when I get home from work - I don't have my books here with me.
also - for the matrix (and real life internet) challenged, Hacking Exposed by Stuart McClure is a good place to start learning what it is to hack into a network. it's written in 'normal people' language and is laid out fairly well. it can give you some pointers on how hacking works in the real world. From there you can extrapolate into the matrix of 2072 with your own ideas.
Okay, this is what I would have you do (keep in mind I'm coming from the point of view of my own games, so this may not be how others may handle it).
1) Data Search the player doesn't know the nexus ID this is an extended Search+Browse Test. The Threshold may be high if the node is not public knowledge. If this is a flat out national secret then this cannot be used.
If my player succeeds in this, I usually point him to some site or person that is rumored to know the piece of info (nexus ID). Then there is a short role-playing opportunity where he tries to get the info.
2) Hack on the Fly I don't know why but in my game, time is always an issue, so its pretty much this option.
I ask my player what programs he has loaded, and its an Extended Hacking+Exploit. The threshold depends on what sort of access he wants (public, security, admin). For every roll he makes, I roll a Firewall+Analyze if I make a threshold equal to his Stealth program (assuming he's running one), the system goes on alert.
If the alert happens before he breaks in this increases his threshold by +4 (this is an increase in Firewall). At this point I have to determine what kinds of responses the alert triggers. Once this happens the Stealth program goes out the door, you are detected.
If you break in without triggering an alert, any IC or spiders are going have to run a matrix perception on you to detect your presence. This is an opposed Comp+Analyze vs Hacking+Stealth. If you are detected the node goes on alert (+4 to firewall).
If all goes well, I determine that whatever you do is something that your access level grants you. If it is, its automatic (or you might have to roll a computer+ program test), if it isn't you will have to roll hacking+program to do an action. Every time you do an action that your access level does not grant the system gets another matrix perception test (that's another opposed test).
And that pretty much it!
Unwired, pg 56: "The Matrix is not real."
Aw, hell. Would've been nice to know that ontological nugget before I got 1/4 of the way through the Matrix book.
Guess I'll go practice some spells instead.
Oh yes, I meant user access.
If the spider or IC does not detect you (because you are running stealth) then what it represents is that your icon looks like the clutter of icons in that node. I try to be as descriptive as I can, making a matrix scene as vivid as any other scene. I first describe the node, and describe what his stealth program makes him into.
For example on our last run he hacked into a security guard's commlink. The node looked like an old wild west mining town, dirt roads, tavern, general store, brothel, etc. His icon looked like a tumble weed.
If you are logged in with a legit account, the spider or other users may recognize you. The way I typically do it is that each type of user (user, sec, admin) and perhaps each department has a certain type of icon. So a nurse with a user account in a doc wagon site, has a standard nurse icon. If you are using some one's id to get access, you look like that person. This then becomes a roleplaying scenario:
"Nurse Patrick, what are you doing here, I thought you were on vacation?" This may require some Con checks.
Lastly, if the hacker is accessed with a lower account then necessary to do what he wants to do, I typically describe the node without the icons that he would have to access to do such action. For example if he is that nurse with a user account, but wanted to edit the cameras, the nodes to access the camera does not exist in his view.
A doc wagon matrix site would probably look like a very clean sterile hospital. Nurses, doctors, janitors, security guards and administrators walking about in immaculate lab coats, etc. However, nurses would not see the door leading to the security room with all the camera monitors.
To see the room the hacker would have to run a matrix perception or the hacker has to run his Reality Filter (note, I changed how reality filters work in my games. Besides this benefit, you get the +1 response, but you don't get the -1 response if you fail, the reason is that this would imply that if you don't bother with the reality filter you always get a -1 to your response. And besides, I go through all the trouble thinking up a metaphor for the node, I hate the thought of him just making it into the same boring thing.
But I allow those actions with a hacking+program. Don't know why, I think it's in the rules, although I might be wrong.
Also note that when you do something above your access level, the threshold is increased by +3 or +6 for any activity (depending on whether you needed sec, or admin access).
Actually I would think something like that would be kept on a closed system (depending on the importance). IE no matrix access no adress to find. If you want to hack it you have to plug in directly or install a wireless radio (a 10 nuyen rating 1 can connect to the hackers or a freind's comlink and boom you have matrix access). So you know what that means: Break out the team's streat samurai/adept/combat mage cause it's time fight your way through a facility. This would be a good old fasioned dungeon crawl and the treasure chest at the end is the closed system.
If it's less important and is online with a secret adress....hack into a corporate employess comlink (should be an easy hack too) do a search of other links he's interfaced with and follow those leads till you find one who's logged onto the adress recently....maybe install a worm or two and have them help you search.
Everything is online, only the most rediculously secure sites whose operations can be done without some kind of online access will be completely dark. THe list of places that could actually operate to that level of self sufficiency will be very slight.
Even a user account is not a guarantee hence why user accounts require a hacking + exploit. Now for a mall or retail node yes they are going to have user accounts freely available so you can access their system. Secured research nodes, not so much. So your going to need to hack your way into a user account (or higher).
Now if, you know where the target is, and can access it from the grid then I recommend a place like a coffin motel sitting next to said cybercafe so you can slowly and carefully probe the target. The biggest plus tot his is, you do your nice long extended test but the system only gets one throw to see you when you log on.
The other thing to higher level access nodes. User accounts are common theres going to be hundreds if not thousands of them online at any one time on the busier systems. Security and Admin accounts not so much. So if admin Bob is online and sees a notation that another admin account has logged on but didn't recieve a greeting from Admin Tom or TIm he may get suspicious.
no it isn't a secret research base is going to have an independent network and is not connected to the matrix. you have to fight your way in.
I don't understand why you think so, have you ever tried working from an off the grid location even in this day and age and get anything technical or research related done? I have, it's a pain in the butt. Plus a basic conciet of the setting is by nature everything is connected to the matrix somehow some where. Now that connection might not just be a blind address in the matrix. It may be a connection to a few other Aztechnology nodes in pyramids somewhere but literally having a site without matrix connection in 2072 is like having a site without a telephone connection ins 2009. It just doesn't happen it's one of the basic conciets of the setting.
Now a perfectly good reason for you to need on site access is the other points of access are themselves murderously well firewalled. Take the ZO. Theoretically hacking the ZO is as simple as pointing a satelite uplink at it and starting a roll. In reality unless your coming in from a recognized site (such as one of the AAA nodes which ar ehtemsleves nightmares to get into) all this approach will likely accomplish is getting your brain fried or getting a thor shot dropped on you once the trace program finishes running.
Id love to read for this. But one question, is there an edition with the Latin verses translated?
Powered by Invision Power Board (http://www.invisionboard.com)
© Invision Power Services (http://www.invisionpower.com)