![]() |
![]() ![]() |
![]() |
![]()
Post
#1
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,219 Joined: 26-February 02 From: Lofwyr's stomach. Member No.: 1,320 ![]() |
OK, so we've established that most Runners would not want a wireless PAN while on a run. But you are a pesky HAcker who REALLY wants to hack that Samurai's Cyber, and you aren't about to let a pesky skinlink or wired setup prevent you from gaining access. How do you propose to get that connection?
Some Ideas: Skinlinks work on skin contact. If you have a skinlink too, and you can get skin to skin contact, then you can hack it. Granted, you'd have to maintain the contact long enough, but you could try it. A modified stick-n-shock round with a broadcaster and skinlink could be shot at someone, and if it hits, then it provides teh connection required. Sneak a bradcasting device into his wired PAN. This would require legwork, but be your backdoor into the system. |
|
|
![]()
Post
#2
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 7,089 Joined: 4-October 05 Member No.: 7,813 ![]() |
yeah, those are your basic options.
i mean, if you wanna get fancy, you could make bolas that will pick up skinlinks. alternatively, you could just develop something that disrupts skinlinks... hit them with that and it'll mess them up pretty good too, and force them to either go wireless, or without access to all those electronic goodies they have ;) |
|
|
![]()
Post
#3
|
|
Chicago Survivor ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,079 Joined: 28-January 04 From: Canton, GA Member No.: 6,033 ![]() |
Honestly, a taser shot should fark anything on a skinlink.
|
|
|
![]()
Post
#4
|
|||
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,651 Joined: 23-September 05 From: Marietta, GA Member No.: 7,773 ![]() |
Been thinking the same thing. |
||
|
|||
![]()
Post
#5
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 7,089 Joined: 4-October 05 Member No.: 7,813 ![]() |
well, they do have a chance of shorting electronics, don't they? i mean, if it's skinlinked... that's just like making a path for the electricity to flow through, isn't it (kinda like how lightning works... air ionizes, and then the lightning follows along that).
so, i would rule that taser hits can short any skinlinked electronics, with non-conductivity on your armor (if any) providing protection |
|
|
![]()
Post
#6
|
|
Chicago Survivor ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,079 Joined: 28-January 04 From: Canton, GA Member No.: 6,033 ![]() |
Which is why my running armor has the electrical shielding.
|
|
|
![]()
Post
#7
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 7,089 Joined: 4-October 05 Member No.: 7,813 ![]() |
that and shock frills =D
|
|
|
![]()
Post
#8
|
|
Chicago Survivor ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 5,079 Joined: 28-January 04 From: Canton, GA Member No.: 6,033 ![]() |
Well, you have to have electrical protection for those. I didn't like them because they just seem silly, other than nobody will want to get near you when they recognize them for what they are.
|
|
|
![]()
Post
#9
|
|
Ain Soph Aur ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,477 Joined: 26-February 02 From: Montreal, Canada Member No.: 600 ![]() |
Wait, why does the skinlink matter? If the item is part of the PAN through skinlink, then you can get to it by first hacking the Commlink then connecting to the item in question. So what's the problem?
|
|
|
![]()
Post
#10
|
|
Moving Target ![]() ![]() Group: Members Posts: 675 Joined: 26-February 02 From: Seattle Member No.: 2,034 ![]() |
It would be sort of cool if you could fire some kind of bullet with a virus that will try to load itself into the targets ware when it hits them. :)
But for a simple tazer there ought to at least be hardening against that sort of thing. Would be kind of cool if it would 'stun' your cyberware by causing it all to crash and reboot or enter safe mode for a bit, but nothing permenant. |
|
|
![]()
Post
#11
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 7,089 Joined: 4-October 05 Member No.: 7,813 ![]() |
that's exactly what tasers do. there is a chance (and a reasonably good one at that) for electronics to be "stunned" (for lack of a better word) whenever hit by electrical attacks. for a device with no/low body/armor, that chancegets even better.
the reason for wanting a skinlink is so that someone has to actually go through your commlink to get to the good stuff, as opposed to just connecting directly to your cyberarm and rebooting it (which would be somewhat inconvenient, to say the least). it's kinda like the purpose of having a SAN in SR3, as opposed to just hooking up every node directly to the matrix. or, as another example, it's also kinda like having systems within systems, so that people have to hack through the outer system to get to the inner systems (like, for example, security, or research notes). |
|
|
![]()
Post
#12
|
|||
Moving Target ![]() ![]() Group: Members Posts: 268 Joined: 26-February 02 From: Brisbane, Australia Member No.: 78 ![]() |
You can achieve that by subscribing your arm to your commlink. That way, the arm only talks to the commlink, meaning that unless he does some serious spoofing, a hacker has to go through the commlink to get to the arm. It'll work this way whether you skinlink it or not. The only advantage skinlinking really offers is that it makes you immune to jamming, and also allows you to still run a PAN even if you have temporarily turned off the wireless capability of your commlink |
||
|
|||
![]()
Post
#13
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 7,089 Joined: 4-October 05 Member No.: 7,813 ![]() |
riiiight... so all those corporate security systems just happen to neglect subscribing to stuff to protect their system... and that's why a completely unauthorized person can hack them.
i mean, sure, no one is going to be hacking your arm in the middle of a fight fast enough to be useful (or, if they are, then you are one really really screwed runner), but you also have to worry about ambush situations and such, where they do have time to hack your arm. and if they can, you don't want it broadcasting, i can tell you that. much better to not have to upgrade the system and response in every part of your PAN to handle crazy defenses. |
|
|
![]()
Post
#14
|
|||
Moving Target ![]() ![]() Group: Members Posts: 268 Joined: 26-February 02 From: Brisbane, Australia Member No.: 78 ![]() |
How do you figure that? Just because you're attempting to hack the network at the physical location of the security device, doesn't mean you're actually hacking the security device itself, you're still connecting to the network and using it to control the device |
||
|
|||
![]()
Post
#15
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 7,089 Joined: 4-October 05 Member No.: 7,813 ![]() |
yes, but if you could protect things from being hacked by simply only allowing subscribed devices to communicate, then hacking wouldn't exactly work now, would it?
my point is, sure, it may be unlikely... but unlikely can get you killed in the shadows. |
|
|
![]()
Post
#16
|
|||
Moving Target ![]() ![]() Group: Members Posts: 268 Joined: 26-February 02 From: Brisbane, Australia Member No.: 78 ![]() |
But that's exactly /how/ it works. You attack the network, create a fake account, and then use that account to issue commands to the security device from the network it's subscribed to |
||
|
|||
![]()
Post
#17
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 7,089 Joined: 4-October 05 Member No.: 7,813 ![]() |
ah, but if you couldn't hack something without being subscribed, then how do you hack the network?
therefore, you could hack an individual piece of the network, provided it is within range. |
|
|
![]()
Post
#18
|
|||||
Moving Target ![]() ![]() Group: Members Posts: 268 Joined: 26-February 02 From: Brisbane, Australia Member No.: 78 ![]() |
You hack it by connecting to the firewalled "front door" part of the network that accepts outside connections. In a runners case, this is the commlink, in a security network, it's a server sitting in the server room somewhere. In either case, it's designed to be the only part of the network that accepts outside connections, and is thus where all the defences are placed
I'm sure you could still hack a subscribed device directly by using Electronic Warfare, spoofing signals etc, but that takes more time and effort then picking the lock on the front door :) |
||||
|
|||||
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 11th March 2025 - 10:44 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.