IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
Ramid
post Dec 12 2012, 02:28 PM
Post #1


Target
*

Group: Members
Posts: 7
Joined: 15-October 03
Member No.: 5,720



Was re reading Unwired and came across something that has me confused.

Page 79 Security in action. Describes a hacker hacking himself an admin account on a node then shutting down a piece of Ice. It then mentions this. "Since Jin is watching the Node she makes a matrix perception teset to see if she notices the program being shut down, and suceeds...."


so the question is what is this ? according to how i understood how the rules worked the times when a hacker might be noticed are when logging on. When using a hacking/exploit program, when the access list updates and when the node ice or spider randomly scans the node using analyze.

I can understand the abstract of a security spider noticing Ice suddenly winking out or icons for peripheral connected objects going on off. But i have never seen any rule dealing with this, is this just a mistake in the text or were is the game mechanics behind a hacker noticing another stealthed hackers actions. is it an opposed stealth vs analyze roll or is it a treshold roll or what.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Dec 12 2012, 02:39 PM
Post #2


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



It is a simple Matrix Perception Roll to notice that your IC was just shut down, assuming you are not alerted on such an occurence automatically (You are the Spider after all, and you know what SHOULD be running). You may not know that a HACKER did that (he is probably stealthed, but I bet you start looking for that too), but it is odd, and you will likely start to investigate such an occurence. You will surely reactivate the IC at a minimum.
Go to the top of the page
 
+Quote Post
Miri
post Dec 12 2012, 03:50 PM
Post #3


Moving Target
**

Group: Members
Posts: 271
Joined: 5-July 11
From: Firebase Zulu
Member No.: 32,769



QUOTE (Tymeaus Jalynsfein @ Dec 12 2012, 08:39 AM) *
It is a simple Matrix Perception Roll to notice that your IC was just shut down, assuming you are not alerted on such an occurence automatically (You are the Spider after all, and you know what SHOULD be running). You may not know that a HACKER did that (he is probably stealthed, but I bet you start looking for that too), but it is odd, and you will likely start to investigate such an occurence. You will surely reactivate the IC at a minimum.


Of course if the Hacker is good enough he has already spoofed/edited the IC whitelist such that the IC will ignore him.

(IMG:style_emoticons/default/rotate.gif)
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Dec 12 2012, 04:08 PM
Post #4


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Miri @ Dec 12 2012, 08:50 AM) *
Of course if the Hacker is good enough he has already spoofed/edited the IC whitelist such that the IC will ignore him.

(IMG:style_emoticons/default/rotate.gif)


Assuming that you have access to that information ON THE NODE YOU ARE ON. Why make that assumption?
Go to the top of the page
 
+Quote Post
Miri
post Dec 12 2012, 05:29 PM
Post #5


Moving Target
**

Group: Members
Posts: 271
Joined: 5-July 11
From: Firebase Zulu
Member No.: 32,769



QUOTE (Tymeaus Jalynsfein @ Dec 12 2012, 10:08 AM) *
Assuming that you have access to that information ON THE NODE YOU ARE ON. Why make that assumption?


If I'm hacking the node and I know there is a Spider active, then that would be the first thing I would try to do after I shut down the IC. Make the changes while it is offline and when the Spider restarts it the IC reads its whitelist and goes about its business. Changing the list while the IC is active is fraught with peril.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Dec 12 2012, 05:34 PM
Post #6


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Miri @ Dec 12 2012, 10:29 AM) *
If I'm hacking the node and I know there is a Spider active, then that would be the first thing I would try to do after I shut down the IC. Make the changes while it is offline and when the Spider restarts it the IC reads its whitelist and goes about its business. Changing the list while the IC is active is fraught with peril.


Except that the IC may not be on the Node you are on when it is reactivated. It may be on a different node, and thransfer there from activation. Which was my point, of course. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Miri
post Dec 12 2012, 07:05 PM
Post #7


Moving Target
**

Group: Members
Posts: 271
Joined: 5-July 11
From: Firebase Zulu
Member No.: 32,769



QUOTE (Tymeaus Jalynsfein @ Dec 12 2012, 11:34 AM) *
Except that the IC may not be on the Node you are on when it is reactivated. It may be on a different node, and thransfer there from activation. Which was my point, of course. (IMG:style_emoticons/default/smile.gif)



Well then, yeah. Will have to find another way to hamper the IC from finding you. :/
Go to the top of the page
 
+Quote Post
Ramid
post Dec 12 2012, 07:08 PM
Post #8


Target
*

Group: Members
Posts: 7
Joined: 15-October 03
Member No.: 5,720



So what would be the game mechanic behind this ?

matrix perception vs treshold
computer + analyze vs a treshold defined by the gm

or a test vs stealth to notice the change in the system ?
computer + analyze vs hacking + stealth

Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Dec 12 2012, 07:47 PM
Post #9


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



The change is not a stealth one. If you have a program list active, and one of the programs goes inactive, it is pretty obvious.

I would likely use just a Matrix Perception Test. Success means you notice the change. For something like changing data in a file, that would be different. You would need to audit the file. But, once you have done so, you likely catch the change. Even if you do not know what WAS removed, you will see the "blank" spot. If you are looking for altered Data, then you will need to audit it more specifically. Maybe with a Threshold equal to the Edit Successes. Cannot remember right off the top of my head, though.
Go to the top of the page
 
+Quote Post
SpellBinder
post Dec 12 2012, 11:09 PM
Post #10


Neophyte Runner
*****

Group: Members
Posts: 2,351
Joined: 19-September 09
From: Behind the shadows of the Resonance
Member No.: 17,653



QUOTE (Miri @ Dec 12 2012, 12:05 PM) *
Well then, yeah. Will have to find another way to hamper the IC from finding you. :/

Obviously said hacker in this scenario doesn't have a Disarm program. If the IC is armed with Analyze, disarm it. If the IC is also armed with Attack, maybe disarm it too. Might slow you down a bit, but substantially less obvious than switching a program off on a node that's being watched from the outside.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Dec 12 2012, 11:25 PM
Post #11


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (SpellBinder @ Dec 12 2012, 04:09 PM) *
Obviously said hacker in this scenario doesn't have a Disarm program. If the IC is armed with Analyze, disarm it. If the IC is also armed with Attack, maybe disarm it too. Might slow you down a bit, but substantially less obvious than switching a program off on a node that's being watched from the outside.


Indeed, this is one way to go about it, and is indeed my preferred method. Well, that and not being detected in the first place. I don't mess with IC generally, unless I have to do so. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Sengir
post Dec 12 2012, 11:26 PM
Post #12


Great Dragon
*********

Group: Dumpshocked
Posts: 5,091
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



QUOTE (Ramid @ Dec 12 2012, 08:08 PM) *
So what would be the game mechanic behind this ?

Since there is no "official" way to hide it (that I'm aware of), it should be a standard Perception thing. Unloading IC is not a big explosion but also not exactly difficult to detect, so threshold 2 seems appropriate.

Moral of the story: Disarm programs when you got the time
Go to the top of the page
 
+Quote Post
Halinn
post Dec 13 2012, 02:15 AM
Post #13


Running Target
***

Group: Members
Posts: 1,018
Joined: 3-July 10
Member No.: 18,786



QUOTE (Sengir @ Dec 13 2012, 12:26 AM) *
Moral of the story: Disarm programs when you got the time

Which is why you always get mute for your Exploit program. Perhaps you raise an alert in a turn, but with no analyze program, they can't do matrix perception to get through your stealth and actually find you.
Go to the top of the page
 
+Quote Post
Udoshi
post Dec 13 2012, 04:18 AM
Post #14


Runner
******

Group: Members
Posts: 2,782
Joined: 28-August 09
Member No.: 17,566



QUOTE (Ramid @ Dec 12 2012, 12:08 PM) *
So what would be the game mechanic behind this ?

matrix perception vs treshold
computer + analyze vs a treshold defined by the gm


No threshold, just a standard matrix perception test. If stealth is running, then it's opposed. See the sidebar in the core book about net hits being used to see bits of information.

Also be aware that Analyze programs have an Automatic Mode that does all this for you automatically. You have to turn it on, tho.
Go to the top of the page
 
+Quote Post
Sengir
post Dec 13 2012, 01:05 PM
Post #15


Great Dragon
*********

Group: Dumpshocked
Posts: 5,091
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



QUOTE (Udoshi @ Dec 13 2012, 05:18 AM) *
No threshold, just a standard matrix perception test.

The examples given for things one hit detects are "neon sign, running crowd, yelling, gunfire". I think unloading the IC is a bit more subtle (IMG:style_emoticons/default/wink.gif)
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 

RSS Lo-Fi Version Time is now: 8th July 2025 - 11:11 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.