IPB

Welcome Guest ( Log In | Register )

> A few Matrix tricks I want to try, Escher Loops, Reality Filters
PoliteMan
post Feb 18 2011, 07:09 AM
Post #1


Moving Target
**

Group: Members
Posts: 400
Joined: 4-August 10
Member No.: 18,889



Ok, there's two tricks I want to try out in upcoming games and I though I'd run them by the Dumpshockers first. One is basically an AR "Invisibility" hack, the other is a defensive attack to screw with technos and hotsiming hackers.

The first trick is pretty simple. Take security guard Bob. Bob is standing at a critical access point that I want to get by. Instead of having the mage cast invisibility, I want to hack into his commlink (shouldn't be too tough) and upload a modified AR software called Reality Filter (AFB). Reality Filter allows you to tune out unpleasant sounds, visuals, and smells. I'm a pretty unpleasant fellow and so I've modified this AR software to consider me and my chummers "unpleasant". Now presuming this guy is using AR (which seems pretty safe) my chummers and I are basically invisible to this slob, right?

If I can get this to work, I'd really like to stick a trojan onto it, then hack into their system and upload it to a nexus as a "standard AR software update". Right setup and you're not only invisible to every slob hooked into their system, you've got a Trojan (like Rat or Vector) to wreck their system whenever you need. Sure, it might be a tough hack, but I can't imagine I'd ever need to hack their system again. Worst case scenario, I Vector in a bunch of Replicating Worms and crash/kill everyone hooked in.

The second one is a take-off on an old trick I saw in a 2nd ed book, I think it was called an Escher Loop. The idea was you access the wrong node/open the wrong file and pretty soon all you see is an Escher painting like the one with the stairs. You're trapped and can't even log off, you just hope one of your chummers comes by and disconnects you before you die of thirst.

My take on this is to use a ring of slaved nodes. It works off this premise. Say I slave node A to node B which is slaved to node C. Anyone trying to access node A gets booted to node C. So in this case I have node A (my hacking commlink) and nodes B-E (metalinks). Node A (my hacking commlink) is slave to node B. Node B, however, is slaved to node C, which is slaved to node D, which is slaved to node E, which is slaved to node B. You've got a complete loop with the actually valuable node hidden outside. Map it out and it looks like a lollipop.

Now someone tries to hack my Commlink (Node A). Because Node A is slaved to node B, they get kicked to node B. However, because node B is slaved to node C, they get kicked to node C, then kicked to node D, then kicked to node E, then kicked back to node B and the whole things starts again.

Presuming that slaving works this way (I'm like 95% confident), the intruder never actually lands in a node, they're constantly being forwarded to a new node. Here's where I'm less sure about what happens. Quite simply, I have no idea if someone can take Matrix actions outside of a node or while they're logging into a new node. If they can, it's just annoying, they logoff and log back on, then DDOS the loop to break it or something. If you cannot, however, then it gets fun. Someone hacking by AR is probably going to be frustrated for a bit, then manually reboot their commlink and try again. Hotsiming hackers are stuck though, they can't take non-Matrix actions (ok, technically they can at like -*8*) and the loop prevents them from taking Matrix actions, meaning they're trapped until either their chummers unhook them or they manage by sheer willpower (at -*8*) to rip their rig off. Technos are even worse off, as far as I know one of their chummers has to find him, figure out what's going on, then knock him out to disconnect him, then suffer dumpshock.

I'd appreciate any advice on these, especially if I messed something up and how I can fix it.
Go to the top of the page
 
+Quote Post

Posts in this topic
- PoliteMan   A few Matrix tricks I want to try   Feb 18 2011, 07:09 AM
- - Ryu   Slaved devices forward connection attempts to thei...   Feb 18 2011, 07:36 AM
|- - Tymeaus Jalynsfein   QUOTE (Ryu @ Feb 18 2011, 12:36 AM) Slave...   Feb 18 2011, 02:00 PM
- - Fortinbras   Your first idea is, essentially, hacking someone...   Feb 18 2011, 02:25 PM
|- - Tymeaus Jalynsfein   QUOTE (Fortinbras @ Feb 18 2011, 07:25 AM...   Feb 18 2011, 02:52 PM
|- - PoliteMan   QUOTE (Tymeaus Jalynsfein @ Feb 18 2011, 10...   Feb 18 2011, 06:03 PM
|- - Fortinbras   QUOTE (Tymeaus Jalynsfein @ Feb 18 2011, 10...   Feb 18 2011, 06:35 PM
|- - Tymeaus Jalynsfein   QUOTE (Fortinbras @ Feb 18 2011, 11:35 AM...   Feb 18 2011, 08:35 PM
- - Ascalaphus   The first idea is quite feasible. It depends on th...   Feb 18 2011, 03:43 PM
- - Adarael   QUOTE (PoliteMan @ Feb 17 2011, 11:09 PM)...   Feb 18 2011, 06:29 PM
- - squee_nabob   You cannot create a group of circular slaves. B wi...   Feb 18 2011, 06:42 PM
|- - Ascalaphus   QUOTE (squee_nabob @ Feb 18 2011, 07:42 P...   Feb 18 2011, 06:58 PM
- - Fortinbras   Yes, but if that is the case, implementing this pr...   Feb 18 2011, 08:53 PM
|- - Tymeaus Jalynsfein   QUOTE (Fortinbras @ Feb 18 2011, 01:53 PM...   Feb 18 2011, 09:08 PM
|- - Digital Heroin   QUOTE (Fortinbras @ Feb 18 2011, 08:53 PM...   Feb 18 2011, 09:26 PM
- - Fortinbras   Agreed. So the answer to the question "me and...   Feb 18 2011, 09:32 PM
- - Digital Heroin   In a world where people too often put faith in tec...   Feb 18 2011, 09:42 PM
|- - Fortinbras   QUOTE (Digital Heroin @ Feb 18 2011, 05:4...   Feb 18 2011, 09:53 PM
|- - Digital Heroin   QUOTE (Fortinbras @ Feb 18 2011, 10:53 PM...   Feb 18 2011, 10:43 PM
|- - Fortinbras   QUOTE (Digital Heroin @ Feb 18 2011, 06:4...   Feb 19 2011, 12:18 AM
- - KarmaInferno   There is a significant difference between merely c...   Feb 18 2011, 09:58 PM
|- - Tymeaus Jalynsfein   QUOTE (KarmaInferno @ Feb 18 2011, 02:58 ...   Feb 18 2011, 10:24 PM
- - tagz   It's not so easy to do with the Negator softwa...   Feb 18 2011, 10:35 PM
|- - PoliteMan   QUOTE (tagz @ Feb 19 2011, 06:35 AM) It...   Feb 19 2011, 05:02 PM
|- - Mardrax   QUOTE (PoliteMan @ Feb 19 2011, 06:02 PM)...   Feb 19 2011, 05:55 PM
- - SpellBinder   Made me think of a video I saw for a version of Ph...   Feb 18 2011, 10:48 PM
|- - Draco18s   QUOTE (SpellBinder @ Feb 18 2011, 05:48 P...   Feb 19 2011, 12:41 AM
- - Ascalaphus   What about not editing you out, but only removing ...   Feb 18 2011, 10:58 PM
- - SpellBinder   Sure, now. What about after sixty years of comput...   Feb 19 2011, 04:09 AM
- - ProfGast   I think the AR hacking overlay would work, but onl...   Feb 19 2011, 06:02 PM
- - otakusensei   There's a bit of software available now that r...   Feb 19 2011, 07:37 PM


Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 20th September 2025 - 08:12 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.