Oct 20 2005, 04:51 AM
Post
#1
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 715 Joined: 4-September 05 From: Metaplane GEPLK136 (The one with the lizards. You remember the lizards, don't you?) Member No.: 7,684 |
As it has been requested several times, by myself included, I’ve decided to write an example “hack scenario.” This is by no means authoritative – I have yet to run an SR4 game. In fact, I wrote this with the rules in front of me, looking things up as I went. I've probably got as many questions as anyone else about the hacking rules. What I'm saying is it isn’t necessarily correct. But I figure if I at least throw something out there, we can start getting comments and other examples. So by all means, if you see something wrong with my examples, let me know.
I’ve decided to basically walk through an entire run, and gloss over any non-hacker parts. That might make this post rather long, but I figure too much example is better than not enough (or the current standard, which is no example...) The team will be made up entirely of the Sample Characters found starting on page 89. Most prominent in this example, of course, will be the Hacker, on page 96. I’ve made two changes to the hacker – I’ve added the “Exploit” program at 5. I don’t know how a hacker gets by without exploit, without that you can’t get in the door. I’ve also given him an “Agent 4” program, to demonstrate the use of agents. I’ve gone ahead and used a dice rolling program to roll the dice, to add to the realism. I won’t be doing any technomancers this time. I’ll be breaking the story into several sections, with each section its own reply to this post. It will be long enough as is... I tried to address nearly all of Eyeless Blond’s suggestions for examples posted in another thread. I think I got them all but rigging: -hacking a secured node (plenty of time to Probe the target) -hacking a secured node (building burning down around you) -stealing someone's car -Rigging -at a meet with a Johnson -doing a research project; legwork -doing a disinformation project; anti-legwork? Wrapup is the last section; please wait until it is posted to comment. It shouldn’t take me long to cut, paste, and format. So, without further a due, I bring you Ménage-a-Trideo The players: Hacker – Jim Bean Face – Façade Gunslinger Adept – Handsome Stranger Radical Eco Shaman – Lilly italics is story plain text is hacking rules. |
|
|
|
Feshy A (very long) Hacking Example Oct 20 2005, 04:51 AM
Feshy The Bar
It's always a bar, isn't it...
J... Oct 20 2005, 04:55 AM
Feshy Legwork
The team splits up for legwork. Lilly a... Oct 20 2005, 04:59 AM
Feshy The Break In
A quick Stick-n-Shock ambush by H... Oct 20 2005, 05:01 AM
Feshy Wrapup
There’s no more hacking here, but I wante... Oct 20 2005, 05:02 AM
evil1i Great story Feshy! Don't know if you have... Oct 20 2005, 06:32 AM
Shinobi Killfist QUOTE (Feshy) Wrapup
Post: Apparently I am very... Oct 20 2005, 06:35 AM
Fortune I was entertained ... nice job!
So Matrix Gu... Oct 20 2005, 07:28 AM
Casper Quick oberservation.... with jim loading an agent... Oct 20 2005, 07:52 AM
evil1i QUOTE (Feshy)As the Agent is rating 4, the program... Oct 20 2005, 08:05 AM
Metus Thanks, Feshy, for the example; it defintely helpe... Oct 20 2005, 11:17 AM
Rifleman unfortunately, in their attempts towards making th... Oct 20 2005, 11:59 AM
Lord Ben You said it loaded IC onto the comlink but isn... Oct 20 2005, 01:13 PM
Magus Way to go Feshy, that does break down the majority... Oct 20 2005, 02:28 PM
Chandon I'm not sure what the rules say, but IRL if an... Oct 20 2005, 03:12 PM
Veggiesama Beautiful examples. This is exactly what we needed... Oct 20 2005, 07:04 PM
Feshy Thanks for the encouragement and comments, everyon... Oct 20 2005, 07:11 PM
Feshy QUOTE Beautiful examples. This is exactly what we ... Oct 20 2005, 07:21 PM
Rifleman QUOTE (Feshy) QUOTE Use various types of passcodes... Oct 20 2005, 07:45 PM
Lord Ben Just have it so whatever comlink is connecting in ... Oct 20 2005, 08:12 PM
Veggiesama For separate nodes, do you need to make seperate H... Oct 20 2005, 09:35 PM
Feshy QUOTE (Veggiesama) For separate nodes, do you need... Oct 20 2005, 10:17 PM
hobgoblin hmm, it could be that the corp network style nodes... Oct 21 2005, 01:29 AM
Rifleman We really should begin saving and sorting everythi... Oct 21 2005, 02:06 AM
Veggiesama QUOTE (Feshy) I suppose it would depend on your in... Oct 21 2005, 02:59 AM
Valatar Under Windows Server 2003, which we could consider... Oct 21 2005, 08:06 AM
RunnerPaul QUOTE (Valatar) 1. Reaching for admin level access... Oct 21 2005, 08:49 AM
Namergon hacking Admin privileges is not more difficult tha... Oct 21 2005, 10:01 AM
Vector QUOTE (Feshy) The Bar
...
Jim lost focus on the co... Oct 21 2005, 01:18 PM
Eyeless Blond Indeed; this is why it's almost never worth ru... Oct 21 2005, 02:00 PM
Vector I'm pretty sure it is a Simple Action to stop ... Oct 21 2005, 02:48 PM
Feshy QUOTE Now real world computer security is made by ... Oct 21 2005, 05:29 PM
2bit Nice post, Feshy. It was nice to read examples in... Oct 21 2005, 08:21 PM
NightRain QUOTE Jim searches for Vonna’s now-hidden commlin... Oct 21 2005, 10:31 PM
Feshy Great comments, NightRain!
QUOTE Nothing in... Oct 22 2005, 12:16 AM
Dogsoup * saves thread to HD * Oct 22 2005, 12:44 AM
hobgoblin there is a reason why having root/admin level acce... Oct 22 2005, 03:18 AM
Hasaku If the hacker creates an admin account, spawning I... Oct 22 2005, 09:03 AM
NightRain QUOTE The interval is one combat turn, that means ... Oct 22 2005, 11:04 AM
hobgoblin QUOTE (Hasaku) If the hacker creates an admin acco... Oct 22 2005, 05:01 PM
Hasaku QUOTE (hobgoblin) QUOTE (Hasaku @ Oct 22 2005... Oct 24 2005, 05:55 AM
hobgoblin that is if the target flagging follows the account... Oct 24 2005, 06:04 AM
Rifleman Or you can do what I did to my overambitious hacke... Oct 24 2005, 11:20 AM
Oracle QUOTE (hobgoblin) the moment a person hits admin, ... Oct 24 2005, 11:28 AM
Eyeless Blond How about this: actually coming off Alert statuc (... Oct 24 2005, 12:32 PM
Rifleman QUOTE (Oracle @ Oct 24 2005, 06:28 AM) Which ... Oct 24 2005, 01:36 PM
hobgoblin QUOTE (Oracle) QUOTE (hobgoblin @ Oct 24 2005... Oct 24 2005, 08:58 PM
tmiya With a permission of Feshy, I started Japanese tra... Oct 26 2005, 03:21 PM
Gauvain Methinks that the Real Life IT geeks are futzing u... Feb 7 2006, 11:22 PM
Chaos Kingpin Yea!
I am really glad this got bumped up... Feb 8 2006, 04:48 AM![]() ![]() |
|
Lo-Fi Version | Time is now: 28th November 2025 - 03:53 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.