IPB

Welcome Guest ( Log In | Register )

> Spoofing vs Slaved Commlink
Bearclaw
post Jun 1 2011, 10:48 PM
Post #1


Shooting Target
****

Group: Members
Posts: 1,632
Joined: 26-February 02
From: Portland Oregon, USA
Member No.: 1,304



OK, so my team, including myself, has all of our commlinks slaved to my external commlink running battle-tac.
The street sam has skinlink on and all cyberware set to DNI only. Meaning that his cyberware only accepts commands from his commlink, and his commlink only accepts commands from my commlink.
The only way he can be messed with wirelessly is to hack the master commlink, right?

As in, spoof doesn't work against his gear, because it's secured, and you can't get to his commlink without going through my commlink. Sounds too simple.
Go to the top of the page
 
+Quote Post
10 Pages V   1 2 3 > »   
Start new topic
Replies (1 - 24)
Ghost_in_the_Sys...
post Jun 1 2011, 10:54 PM
Post #2


Moving Target
**

Group: Members
Posts: 433
Joined: 12-May 11
Member No.: 29,932



A only accepts commands from B, and B only accepts commands from C. If you spoof to look like C, then B accepts commands because it thinks the spoof is C. Also, chaining the slaving is pointless, because if a hacker gets control of C or spoofs C, it commands A just as easily as it commands B.
Go to the top of the page
 
+Quote Post
Makki
post Jun 1 2011, 11:08 PM
Post #3


Running Target
***

Group: Members
Posts: 1,373
Joined: 14-January 10
From: Stuttgart, Germany
Member No.: 18,036



slaved devices are not unhackable or unspoofable afaik. slaving just gives a negative dice modifier
Go to the top of the page
 
+Quote Post
Ghost_in_the_Sys...
post Jun 1 2011, 11:14 PM
Post #4


Moving Target
**

Group: Members
Posts: 433
Joined: 12-May 11
Member No.: 29,932



QUOTE (Makki @ Jun 1 2011, 07:08 PM) *
slaved devices are not unhackable or unspoofable afaik. slaving just gives a negative dice modifier

They are unhackable actually. They have to be spoofed. Well, unless you can get a direct physical line to the device in question, and even then it throws on a serious penalty.
Go to the top of the page
 
+Quote Post
Bearclaw
post Jun 1 2011, 11:15 PM
Post #5


Shooting Target
****

Group: Members
Posts: 1,632
Joined: 26-February 02
From: Portland Oregon, USA
Member No.: 1,304



QUOTE (Ghost_in_the_System @ Jun 1 2011, 03:54 PM) *
A only accepts commands from B, and B only accepts commands from C. If you spoof to look like C, then B accepts commands because it thinks the spoof is C. Also, chaining the slaving is pointless, because if a hacker gets control of C or spoofs C, it commands A just as easily as it commands B.


I was under the impression that you couldn't spoof commands to commlinks. It doesn't have a pilot rating. Is it considered a peripheral device?
Go to the top of the page
 
+Quote Post
Ghost_in_the_Sys...
post Jun 1 2011, 11:21 PM
Post #6


Moving Target
**

Group: Members
Posts: 433
Joined: 12-May 11
Member No.: 29,932



QUOTE (Bearclaw @ Jun 1 2011, 07:15 PM) *
I was under the impression that you couldn't spoof commands to commlinks. It doesn't have a pilot rating. Is it considered a node?

Basically every device is a node, yes. A commlink is a node, a cyberarm is a node, a fridge is a node.
Go to the top of the page
 
+Quote Post
Bearclaw
post Jun 1 2011, 11:22 PM
Post #7


Shooting Target
****

Group: Members
Posts: 1,632
Joined: 26-February 02
From: Portland Oregon, USA
Member No.: 1,304



Sorry, I edited before you answered (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Fortinbras
post Jun 1 2011, 11:25 PM
Post #8


Moving Target
**

Group: Members
Posts: 772
Joined: 12-December 07
From: Fort Worth, Texas
Member No.: 14,589



One can Spoof commands to his commlink if they have your Access ID, something they can get with a Detect Wireless Signal check.
The downside here is that you can't spoof your Access ID because, if you do, the other commlinks won't be able to do anything. They do all their stuff through your commlink and, if they no longer recognize your commlink(because it's running a different Access ID) they aren't receiving or giving any commands to anything they recognize.
The other drawback is that your subscription limit is severely clogged up with all the team's commlinks.
It also means that if someone gets into your commlink, they have access to everybody on the team and don't have to hack one person at a time.

As with anything, when you increase security, you decrees access. Same goes for physical and Astral security.
Go to the top of the page
 
+Quote Post
Makki
post Jun 1 2011, 11:25 PM
Post #9


Running Target
***

Group: Members
Posts: 1,373
Joined: 14-January 10
From: Stuttgart, Germany
Member No.: 18,036



QUOTE (Bearclaw @ Jun 1 2011, 07:15 PM) *
I was under the impression that you couldn't spoof commands to commlinks. It doesn't have a pilot rating. Is it considered a peripheral device?

everything's a node. and Unwired p55 says the slave is a node and can be spoofed. and there isn't even the modifier I believed there was.
So if B is slaved to A, I can spoof A's ID. If B is a commlink I can tell it to shut down/restart/play AR-Porn/etc
Go to the top of the page
 
+Quote Post
Laughing One
post Jun 1 2011, 11:25 PM
Post #10


Target
*

Group: Members
Posts: 37
Joined: 22-December 08
Member No.: 16,704



Unwired, pg55 under "Slaving".
QUOTE
...Hackers have three options when faced with a slaved node.
First, they can hack in directly to the slave with an additional
threshold modifier of +2, though this requires a physical (wired)
connection to the device. Second, they can hack the master node
(thus gaining access to the slaved node—and any other slaves—
as well), though this node is usually more secure. Third, they can
spoof the access ID of the master node and then spoof commands
to the slave.


And one more thing: DNI is a device-to-brain interface. The samurai dont need to connect his cyber to any commlink.
Go to the top of the page
 
+Quote Post
Ghost_in_the_Sys...
post Jun 1 2011, 11:28 PM
Post #11


Moving Target
**

Group: Members
Posts: 433
Joined: 12-May 11
Member No.: 29,932



QUOTE (Unwired p55)
Hackers have three options when faced with a slaved node.
First, they can hack in directly to the slave with an additional
threshold modifier of +2, though this requires a physical (wired)
connection to the device. Second, they can hack the master node
(thus gaining access to the slaved node—and any other slaves—
as well), though this node is usually more secure. Third, they can
spoof the access ID of the master node and then spoof commands
to the slave.
Go to the top of the page
 
+Quote Post
Bearclaw
post Jun 1 2011, 11:30 PM
Post #12


Shooting Target
****

Group: Members
Posts: 1,632
Joined: 26-February 02
From: Portland Oregon, USA
Member No.: 1,304



My impression is, to spoof a command, you have to be sending the command to something that accepts commands. The pilot in a drone, or the equivalent in a coffee maker or or taxi. If there isn't a pilot type program running, you can't tell it what to do, so you can't send it a spoofed command.

Example: You can't spoof a command to a gun. There's nothing there to accept the command. You can spoof a command to a smartlink, it's got just enough of a brain to accept commands like, full-auto or eject clip.

I don't believe a commlink has anything built in to accept and act on commands, but I'd be happy if some one showed me where I'm wrong.
Go to the top of the page
 
+Quote Post
Ghost_in_the_Sys...
post Jun 1 2011, 11:32 PM
Post #13


Moving Target
**

Group: Members
Posts: 433
Joined: 12-May 11
Member No.: 29,932



QUOTE (Bearclaw @ Jun 1 2011, 07:30 PM) *
My impression is, to spoof a command, you have to be sending the command to something that accepts commands. The pilot in a drone, or the equivalent in a coffee maker or or taxi. If there isn't a pilot type program running, you can't tell it what to do, so you can't send it a spoofed command.

Example: You can't spoof a command to a gun. There's nothing there to accept the command. You can spoof a command to a smartlink, it's got just enough of a brain to accept commands like, full-auto or eject clip.

I don't believe a commlink has anything built in to accept and act on commands, but I'd be happy if some one showed me where I'm wrong.

Everything in a commlink is built to accept and act on commands. Shut down, load attack program, give admin privilage to access ID 4372469, change master to ID 4372469, etc.
Go to the top of the page
 
+Quote Post
Bearclaw
post Jun 1 2011, 11:33 PM
Post #14


Shooting Target
****

Group: Members
Posts: 1,632
Joined: 26-February 02
From: Portland Oregon, USA
Member No.: 1,304



From pg. 236 BBB

QUOTE
The target of a spoof attempt must either have a Pilot rating or be
a peripheral device. Most often you will spoof a drone or an agent, but
you may also use spoof to do things like unlock doors, get free cab rides,
and make the McHugh’s autocooker prepare your soyburger exactly
the way you like it.
Go to the top of the page
 
+Quote Post
Fortinbras
post Jun 1 2011, 11:39 PM
Post #15


Moving Target
**

Group: Members
Posts: 772
Joined: 12-December 07
From: Fort Worth, Texas
Member No.: 14,589



You are turning the commlink to a peripheral device by making it slaved.
Go to the top of the page
 
+Quote Post
Ghost_in_the_Sys...
post Jun 1 2011, 11:44 PM
Post #16


Moving Target
**

Group: Members
Posts: 433
Joined: 12-May 11
Member No.: 29,932



Well, 'Peripheral device' isn't defined anywhere in the book, other than mentioning a couple of particular examples. I take 'peripheral device' to mean 'anything capable of accepting and acting on electronic commands', which would include commlinks along with everything on your list. I think the reason that it mentions pilot/agent in particular is that they aren't devices, they're computer constructs, and so wouldn't be affected by spoof if it only said devices.

However, regardless of trying to define peripheral device, as myself and three other people have quoted, the rules say very directly that spoof is an acceptable means of defeating slaving. This could mean that a commlink is a peripheral device (Which I believe to be the case) or it could mean that a slaved commlink is a particular exception of some kind.

FYI I define peripheral device as any device that is connected (or could be connected) to another device in some way.
Go to the top of the page
 
+Quote Post
Bearclaw
post Jun 1 2011, 11:48 PM
Post #17


Shooting Target
****

Group: Members
Posts: 1,632
Joined: 26-February 02
From: Portland Oregon, USA
Member No.: 1,304



So....having cyberware is stupid?
If any jackass with a rating 3 commlink and an off the rack agent can completely shut you down, what's the point?
Go to the top of the page
 
+Quote Post
Fortinbras
post Jun 1 2011, 11:54 PM
Post #18


Moving Target
**

Group: Members
Posts: 772
Joined: 12-December 07
From: Fort Worth, Texas
Member No.: 14,589



You need to check out Unwired. It gives a great many detail on things like this.
Much of your cyberware can be made without wireless.
Spoofing also means that you are only giving one command per action, as opposed to hacking, in which case you have complete access to the device.
You also have to be within mutual signal range of the device you are spoofing. Most cyberware, when it is wireless, has a Signal range of 0.

That being said, having cyberware makes you vulnerable to hackers. In this way hackers are not toothless in combat.
Go to the top of the page
 
+Quote Post
Ghost_in_the_Sys...
post Jun 2 2011, 12:08 AM
Post #19


Moving Target
**

Group: Members
Posts: 433
Joined: 12-May 11
Member No.: 29,932



Mutual signal range includes any and all devices that you can bounce the connection off of, it doesn't have to be a direct mutual signal range.

It isn't bad to have cyberware though, all you have to do is turn off the wireless when you don't actively need its wireless to be on (such as running a diagnoses every so often).

Also, while you can only spoof one command at a time, your first command can be 'accept me as the new master' and then you have full admin access. So slaving a device can be potentially dangerous.

Edit: Well, what I said about mutual signal range isn't quite right, but there are -very- few applications in which routing can't accomplish the same thing as mutual signal range, and spoofing access to someone's cyberware isn't one of those exceptions.
Go to the top of the page
 
+Quote Post
James McMurray
post Jun 2 2011, 12:22 AM
Post #20


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



QUOTE (Ghost_in_the_System @ Jun 1 2011, 06:44 PM) *
Well, 'Peripheral device' isn't defined anywhere in the book, other than mentioning a couple of particular examples.


It's actually defined pretty clearly. A commlink is most definitely not a peripheral device.

QUOTE (SR4A core, p. 221)
A peripheral device is a Matrix-capable appliance or piece of equipment that is wireless (or in some cases wired) but is not intended to be used for full-blown Matrix interfacing and processing.


A commlink is a device intended for matrix interfacing and processing, ergo it ain't one.
Go to the top of the page
 
+Quote Post
KarmaInferno
post Jun 2 2011, 12:41 AM
Post #21


Old Man Jones
********

Group: Dumpshocked
Posts: 4,415
Joined: 26-February 02
From: New York
Member No.: 1,699



Basically the only really effective way to not be hacked is not have data connections to outside your PAN.



-k
Go to the top of the page
 
+Quote Post
Fortinbras
post Jun 2 2011, 12:41 AM
Post #22


Moving Target
**

Group: Members
Posts: 772
Joined: 12-December 07
From: Fort Worth, Texas
Member No.: 14,589



QUOTE (Ghost_in_the_System @ Jun 1 2011, 07:08 PM) *
Also, while you can only spoof one command at a time, your first command can be 'accept me as the new master' and then you have full admin access. So slaving a device can be potentially dangerous

Only if the Access ID you are spoofing has admin privileges. Even then "Accept me as the new master" is a bit of a misnomer.
The first thing you would need to do is delete the enslavement. Then you would need to hack in and create a legit account for yourself, probably an admin account. Once you have a legit admin account you can slave the device to yourself.
This cannot be done in one command.

You can't just give the command "Be enslaved to X Access ID" because X Access ID doesn't have an account.
Go to the top of the page
 
+Quote Post
Fortinbras
post Jun 2 2011, 12:43 AM
Post #23


Moving Target
**

Group: Members
Posts: 772
Joined: 12-December 07
From: Fort Worth, Texas
Member No.: 14,589



QUOTE (James McMurray @ Jun 1 2011, 07:22 PM) *
It's actually defined pretty clearly. A commlink is most definitely not a peripheral device.
A commlink is a device intended for matrix interfacing and processing, ergo it ain't one.

Unwired more clearly defines what you can and cannot Spoof that overrides the BBB.

QUOTE (Unwired p.98)
As described under Spoof Command, p. 224, SR4, a
hacker can use Spoof software to send commands to a target
that look like they were sent by someone with control
or access privileges. This trick may be used to
falsify commands to drones, agents, sprites
(technomancers only), electronic devices,
and slaved nodes.
Go to the top of the page
 
+Quote Post
James McMurray
post Jun 2 2011, 12:45 AM
Post #24


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



Cool. I was responding specifically to the claim that peripheral devices aren't defined (hence my only quoting that portion).
Go to the top of the page
 
+Quote Post
Fortinbras
post Jun 2 2011, 12:50 AM
Post #25


Moving Target
**

Group: Members
Posts: 772
Joined: 12-December 07
From: Fort Worth, Texas
Member No.: 14,589



Yeah, Peripheral Nodes are clearly defined on p. 48 of Unwired.
Go to the top of the page
 
+Quote Post

10 Pages V   1 2 3 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 5th February 2025 - 08:04 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.