IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Hacking Scenarios Q&A
calypso
post Oct 12 2005, 03:09 PM
Post #1


Moving Target
**

Group: Members
Posts: 238
Joined: 18-August 05
Member No.: 7,569



So, you're with your team when you get up to a door with a maglock. A good one. With a proximity card reader as well as fingerprint scanner. How do you get past it?
Go to the top of the page
 
+Quote Post
blakkie
post Oct 12 2005, 03:21 PM
Post #2


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



*shakes the Magic 8 ball*

Aztechnology Striker w/AV Rocket? :silly:
Go to the top of the page
 
+Quote Post
JesterX
post Oct 12 2005, 03:25 PM
Post #3


Moving Target
**

Group: Members
Posts: 358
Joined: 12-May 05
From: The nearest UV host near you...
Member No.: 7,390



I blast through the door with my panther assault canon.

No, seriously, I suppose I'll have to brute-force hack that lock system. As a GM, I'll probably rule out that the entire authentification system is a single host with a pretty high rating.

The character will have to make an Hacking + Exploit (Firewall, 1 initiative pass) extended test to log on the host. I'll also require the hacker to gain Admin privileges (+6 to the threshold).

After that, the hacker will have to spoof a fake authorization to the device with an opposed Hacking + Spoof vs. target Pilot + Firewall.

Of course, you can also rule that the fingerprint reader and the maglock card reader are two separate hosts (that needs to be hacked in the same time, which is perfectly legal in SR4)

Go to the top of the page
 
+Quote Post
JesterX
post Oct 12 2005, 03:26 PM
Post #4


Moving Target
**

Group: Members
Posts: 358
Joined: 12-May 05
From: The nearest UV host near you...
Member No.: 7,390



QUOTE (blakkie)
*shakes the Magic 8 ball*

Aztechnology Striker w/AV Rocket? :silly:

Hehehe, you answered faster than me... ^_^

Classic jokes are never boring... ^_^
Go to the top of the page
 
+Quote Post
Lord Ben
post Oct 12 2005, 03:35 PM
Post #5


Moving Target
**

Group: Members
Posts: 600
Joined: 31-August 05
Member No.: 7,659



First take off the maglock case, then disable the anti-tamper device, then bypass the keycard reader. That'll take less than a minute.

The fingerprints are tricky since you need the real ones or to have copied fake ones. Hopefully the party got fingerprints ahead of time before the run, or shot a guard at some point... :)
Go to the top of the page
 
+Quote Post
calypso
post Oct 12 2005, 04:11 PM
Post #6


Moving Target
**

Group: Members
Posts: 238
Joined: 18-August 05
Member No.: 7,569



QUOTE (Lord Ben)
First take off the maglock case, then disable the anti-tamper device, then bypass the keycard reader. That'll take less than a minute.

The fingerprints are tricky since you need the real ones or to have copied fake ones. Hopefully the party got fingerprints ahead of time before the run, or shot a guard at some point... :)

This would be the only way (short of the panther cannon) if the door was not matrix enabled, yeah?

Why would a door be matrix enabled?

1) To allow for real-time uploading of use data (who is going in/out)

2) To allow for overrides in emergency situations

3) To allow hackers a way to bypass their security

Anything else?
Go to the top of the page
 
+Quote Post
Lord Ben
post Oct 12 2005, 04:29 PM
Post #7


Moving Target
**

Group: Members
Posts: 600
Joined: 31-August 05
Member No.: 7,659



Whether or not the door is matrix enabled bypassing the door using fakes or the hardware skill still works.

EDIT: And yeah, short of blowing it off it's hinges you'd need a fake or a good faker kit whether it's magpasskey or sequencer or whatever.
Go to the top of the page
 
+Quote Post
Backgammon
post Oct 12 2005, 04:59 PM
Post #8


Ain Soph Aur
******

Group: Dumpshocked
Posts: 3,477
Joined: 26-February 02
From: Montreal, Canada
Member No.: 600



Here's a new take on maglock:

Card readers are a thing of the past. That's soooo 2050s.

Now all you need is a wireless detector receiving RFID signals from employee RFID tags. The door simply opens up for authorized users and does not otherwise. Why oh why would you use archaic card swiping? For extra annoyance to those who take the hardware-messing approach to opening doors, you can have the actual wireless detector on top of the door behind a few milimeters of plasteel (or somehting else if plasteel block radio signals). Talk about annoying to work on.

The big drawback is signal interception (as wireless hacking is aslo a problem for any other maglock mechanism). Since the RFID signal must travel through airwaves, a patient hacker could stick arounf the door (under an invisibility spell?) and wait for a employee to walk by. Capture signal, decrypt, and duplicate.

A counter to that are logical assessors in the door access. How can an employee open a door 2 floors up when he just opened a door in the basement?

Ah, fun for the whole family!
Go to the top of the page
 
+Quote Post
Lord Ben
post Oct 12 2005, 05:07 PM
Post #9


Moving Target
**

Group: Members
Posts: 600
Joined: 31-August 05
Member No.: 7,659



Well, you don't always have to swipe it. I read in the corebook somewhere that most maglock keys are just cards you put into your comlink. Then when you walk around your comlink shows that you have the maglock key and lets you in.
Go to the top of the page
 
+Quote Post
blakkie
post Oct 12 2005, 05:17 PM
Post #10


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



@JesterX: Why, once i had Admin access, would i have to do something like spoof? I'm in, and i'm master of the domain. FTW i use Command to tell the maglock to open. Might be a REALLY good idea though to first check for a Databomb and disable it before sending the Command. ;)

P.S. I'm wondering if security level access is really all that is required. That extra +3 for Hacking on the Fly is brutal.
Go to the top of the page
 
+Quote Post
Cheops
post Oct 12 2005, 05:55 PM
Post #11


Shooting Target
****

Group: Members
Posts: 1,512
Joined: 26-February 02
Member No.: 392



You'd only need security access--either rip off a security guard's passcode or else a manager's passcode or make your own. As long as you pick the right level of employee you should be able to authorize it without hacking.

BTW the same thing would happen with the wireless passkey reader above the door. All you have to do is hack into the main security node and then either authenticate an appropriate passcode or spoof the device.
Go to the top of the page
 
+Quote Post
JesterX
post Oct 12 2005, 07:43 PM
Post #12


Moving Target
**

Group: Members
Posts: 358
Joined: 12-May 05
From: The nearest UV host near you...
Member No.: 7,390



Yep, you're right... Security access should be enough... and you don't need to spoof. My error... ^_^
Go to the top of the page
 
+Quote Post
NightRain
post Oct 12 2005, 10:21 PM
Post #13


Moving Target
**

Group: Members
Posts: 268
Joined: 26-February 02
From: Brisbane, Australia
Member No.: 78



Though you don't need spoof, you still do need to make a command object action. It probably doesn't use a roll just to to open a door, but it tie the hacker up for a complex action
Go to the top of the page
 
+Quote Post
Wasabi
post Oct 12 2005, 11:06 PM
Post #14


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



You could also do like current government high security areas and have a pressure plate on the floor of an airlock style entry point that detects to make sure the weight on the pad matches up with the bearer to prevent one person letting on others...
Go to the top of the page
 
+Quote Post
Eyeless Blond
post Oct 13 2005, 12:51 AM
Post #15


Decker on the Threshold
******

Group: Dumpshocked
Posts: 2,922
Joined: 14-March 04
Member No.: 6,156



QUOTE (Backgammon)
A counter to that are logical assessors in the door access. How can an employee open a door 2 floors up when he just opened a door in the basement?

This would answer the question of why a door would require Matrix access, actually. Something like that would likely be wired, though; in fact I can't really think of a good reason a building *wouldn't* be almost entirely wired, especially the security-aspects of it like cameras and doors.

Wasabi's got an interesting idea too, but what is the tolerance on something like that? People are going to be carrying briefcases, lunchboxes, etc. and all that has a nontrivial weight associated with it.
Go to the top of the page
 
+Quote Post
Jaid
post Oct 13 2005, 01:17 AM
Post #16


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



as far as why a building might not be wired, it could simply be for ease of installation.

i mean, sure... if one of the Big Ten makes an arcology, then they will do at least portions (and quite possibly large portions) of the system with wired connections. presumably that would include the security, i would think.

however, consider how much easier it is to install something that is wireless. you just stick it there, flip a switch, and BAM, it's on. compare that to installing wired connections, where you have to get the wire from point A to point B, hook it up, etc.

now consider if you are moving into a new building. one that you didn't build from scratch. now, if you want to install security, you can either tear everything apart and put it in, then put everything back together. or, you can go wireless. considering you also have to keep an eye on the SOTA or your security is basically useless, i would say that almost all places would use wireless systems, simply for the reason above.

also, you can have security guards roaming around linked to the security system (AR mode) if it is wireless. you can access it from anywhere, so that if you want to have your security able to command the defenses (or even just be perfectly timed with them), you can. you can also have the system recognise people by their PAN, which means you can have a gun that will distinguish between friend and foe, for example.

now add in the fact that they would have to buy the hardware anyways (be it wireless or otherwise) and the programs are pretty darn cheap, relatively speaking, to defend your network... and you can probably copy them if you have multiple nodes you want protected (the book doesn't say, but i presume that you can buy source code legally. if not, then i would think many corps (even the smaller ones) program their own IC and such, thus being able to copy it as much as they need)

anyways, that's just how i see it.
Go to the top of the page
 
+Quote Post
evil1i
post Oct 13 2005, 05:12 AM
Post #17


Target
*

Group: Members
Posts: 70
Joined: 2-September 05
Member No.: 7,673



QUOTE (Jaid)
i would think many corps (even the smaller ones) program their own IC and such, thus being able to copy it as much as they need)

anyways, that's just how i see it.

Brings to mind taking a Hacker character with a Specialisation in a particular corps programs e.g. Hacking (Renraku Systems) 4(6) so if he is hacking a Renraku (or closely alligned subsiduary) system he gets the spec bonus. Gets the bonus because he used to be a wageslave for said corp and so is very familiar with their systems.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 29th April 2024 - 02:57 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.