IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Linked Passcodes and Passkeys, What purpose do they serve?
RunnerPaul
post Nov 22 2005, 09:53 PM
Post #1


Neophyte Runner
*****

Group: Members
Posts: 2,086
Joined: 26-February 02
Member No.: 364



The book goes to the trouble to spell out the differences between Basic Passcodes, Linked Passcodes, and Passkeys, in some detail on p.215.

However, the sections where the book spells out how you use your hacker tools due to not having proper authorization, such as breaking in, spoofing commands to devices, decrypting files, defusing databombs, and so on, never mention the different levels of passcodes, and don't specify that the process is any different depending on the type of passcoding system used.

What gives?
Go to the top of the page
 
+Quote Post
RunnerPaul
post Nov 23 2005, 08:26 PM
Post #2


Neophyte Runner
*****

Group: Members
Posts: 2,086
Joined: 26-February 02
Member No.: 364



Don't tell me I've stumped the Dump. Surely someone at least has an opinion on this.
Go to the top of the page
 
+Quote Post
blakkie
post Nov 23 2005, 08:40 PM
Post #3


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (RunnerPaul @ Nov 22 2005, 03:53 PM)
What gives?

Incidents of bizzare vagueness in parts of the rules is a hallmark of SR4?

;)
Go to the top of the page
 
+Quote Post
RunnerPaul
post Nov 23 2005, 08:46 PM
Post #4


Neophyte Runner
*****

Group: Members
Posts: 2,086
Joined: 26-February 02
Member No.: 364



QUOTE (blakkie @ Nov 23 2005, 03:40 PM)
Incidents of bizzare vagueness in parts of the rules is a hallmark of SR 4 ?

There, fixed that for you. :D
Go to the top of the page
 
+Quote Post
FrankTrollman
post Nov 23 2005, 09:11 PM
Post #5


Prime Runner
*******

Group: Banned
Posts: 3,732
Joined: 1-September 05
From: Prague, Czech Republic
Member No.: 7,665



OK:

A Passcode can be stolen by intercepting a transmission that has a passcode in it and decrypting it.

A Linked Passcode could be gained the same way, except that you also need to fake a retinal print or something.

A Passkey requires intercepting both the door's query and the response and decrypting both.

All of them can be bypassed by opening up the box and whipping out your own Hardware skill.

-Frank
Go to the top of the page
 
+Quote Post
Feshy
post Nov 23 2005, 09:19 PM
Post #6


Moving Target
**

Group: Members
Posts: 715
Joined: 4-September 05
From: Metaplane GEPLK136 (The one with the lizards. You remember the lizards, don't you?)
Member No.: 7,684



QUOTE (FrankTrollman)
OK:

A Passcode can be stolen by intercepting a transmission that has a passcode in it and decrypting it.

A Linked Passcode could be gained the same way, except that you also need to fake a retinal print or something.

A Passkey requires intercepting both the door's query and the response and decrypting both.

All of them can be bypassed by opening up the box and whipping out your own Hardware skill.

-Frank

Or, logging on and running exploit.

I asked this question in one of my posts, too... there just isn't any info connecting these passcodes to hacking tests in any way. So, the assumption I'm working under is that these passkeys offer methods for getting access without hacking, and are completely irrelevant if you are hacking.
Go to the top of the page
 
+Quote Post
hobgoblin
post Nov 23 2005, 09:31 PM
Post #7


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



bingo, it just provides a GM with info about how to set the system up so that even when the teams hacker is out of action, they can still break in ;)

for a hacker its a "simple" matter of tricking the secuirty system into unlocking that door...
Go to the top of the page
 
+Quote Post
RunnerPaul
post Nov 23 2005, 09:41 PM
Post #8


Neophyte Runner
*****

Group: Members
Posts: 2,086
Joined: 26-February 02
Member No.: 364



Would it be possible to tell, say via the analyze program, if someone's logged in from an account that uses a linked passcode/passkey, vs. someone logged in to a backdoor account that's not linked to biometric data or a specific piece of hardware because it was generated by the exploit program via a "probing the target" attack?

Go to the top of the page
 
+Quote Post
hobgoblin
post Nov 23 2005, 09:50 PM
Post #9


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



well if the logs are detailed enough it would show a door opening but no passkey or code used for that same time.

now, most likely uses of exploit will show up as strange crashes of subsystems and similar. so if a similar thing shows up in the logs at the same time then maybe a smart admin will figure out what happend.

this can allso be what patterns the automatic security system looks for...
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 25th April 2024 - 11:19 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.