IPB

Welcome Guest ( Log In | Register )

2 Pages V  < 1 2  
Reply to this topicStart new topic
> Drone Rigger Questions, how to build a DR character?
De Badd Ass
post Jan 30 2006, 03:54 AM
Post #26


Moving Target
**

Group: Members
Posts: 619
Joined: 18-April 03
From: The UV Nexus
Member No.: 4,474



QUOTE (hobgoblin)
remeber that with digital wireless signals, ECM is as much about putting out oddball datapackages as it is about noice. and a general radio transmitter can turn into a ecm unit if you just feed it the right waveforms and similar, if it can put out the frequency range needed.

ECM is a very broad term...

and with a D/A converter hooked to the right kind of radio, a program can do a whole host of funny things...

Keep in mind that in Shadowrun 4, Riggers control drones via the matrix. You are talking about radio jamming the matrix - a good way to piss EVERYBODY off :(

Use a spot jammer unless you want the sons of the FCC showing up on the scene.
Go to the top of the page
 
+Quote Post
De Badd Ass
post Jan 30 2006, 06:10 AM
Post #27


Moving Target
**

Group: Members
Posts: 619
Joined: 18-April 03
From: The UV Nexus
Member No.: 4,474



QUOTE (milspec @ Jan 27 2006, 11:29 AM)

The reason you want an increased Firewall is because your stock Reponse 3 / Signal 3 / Firewall 3 / System 3 drone is pretty easy for a good hacker to break into:

Hacking Skill 5 + Exploit Program 5 + HotVR 2 = 12 dice (4 hits on average) Firewall 3 + Admin Account 6 = extended test of 9.

That means in 3 combat *passes* the Hacker has compromised your drone.  And he gets 3 passes per turn in Hot VR.

In summary: the drone is basically a commlink that walk/flies and shoots.  You need to upgrade all of the commlink-related attributes in order to upgrade its Pilot, and you should probably have a Rating 5 Firewall on anything you really care about.  (And Rating 5 Analyse to help detect break-ins, with requires a Rating 5 System and Response to run it on.)

My understanding is that it is not that easy to compromise a drone. Usually you want to do something after you access the drone, like give it commands.

The rigger can instruct the drone to only accept commands from his commlink, in which case the hacker has to spoof the drone by impersonating the rigger's commlink.

First, the hacker has to find the rigger and the drone in the matrix. The hacker has to complete a successful Matrix Perception Test to gain the rigger's access ID.

If the rigger and drone are operating in hidden mode (why wouldn't they?), then the hacker will need an Electronic Warfare + Scan extended test to find the rigger and the drone. Of course, the hacker has to be on the lookout for hidden devices in the first place. I'm assuming the the hacker already knows to look because the drone was spotted in the real world. The threshold is 15+

Oops, that's 2 tests; one to detect the rigger's commlink, and another to detect the drone.

If the Rigger deploys a bunch of cheap decoy drones to crowd the environment, then the hacker needs two Electronic Warfare + Scan extended tests to figure out which device is the rigger and which device is the target drone. The threshold is 15+

Then the hacker makes an opposed Matrix Perception test against the rigger's commlink: Computer + Analyse vs. Firewall + Stealth. The hacker needs to succeed before the Rigger detects him.

If the Rigger uses a passkey, then the hacker has to compromise the passkey before the drone will accept communications from the hacker. Now the hacker uses his Hacking + Exploit (Firewall+6, 1 Initiative Pass) Extended Test in order to gain the administrator level access required to obtain the passkey. The hacker needs to succeed before the commlink detects the attempt and alerts the Rigger. The commlink gets a free Analyze + Firewall(Stealth) Extended test time the rigger makes the Hacking + Exploit test.

The passkey will be encrypted, of course. The hacker needs to make a Decrypt + Response (Encryption rating * 2, 1 Combat Turn) Extended Test to break the encryption. Then the hacker needs to make a Hardware + Logic Extended Test (10, 1 day) in order to counterfeit the key.

I wonder if the Rigger will use a data bomb or IC to protect his commlink's passkey. The hacker better use a Matrix Perception Test to detect a data bomb just in case. This is another Computer + Analyze vs Firewall + Stealth. The hacker has to keep trying until he either detects the data bomb or decides that there is none. I guess a smart hacker will have figured out the rating of the commlink by this time, and can guesstimate the firewall and stealth program ratings.

If he finds a data bomb then he needs to make a Hacking + Defuse vs Data Bomb rating * 2. The hacker only gets one attempt. If he fails, the bomb explodes.

Now the hacker can go back and decrypt and counterfeit the passkey.

Finally, to spoof commands, the hacker uses Hacking + Spoof vs Pilot + Firewall.

Of course, if the Rigger and drone use encrypted commands, then the hacker needs encryption and decryption.

The Rigger should invest in commlink as that is his first line of defense. Get a stealth program, and operate in hidden mode. Get a hardware passkey.

--------------------------

Of course, if the hacker doesn't want to give commands to the drone then it is a different story.

In that case the drone is just another hidden node on the net. The hacker just needs to detect the drone as above, and use a Hacking + Exploit (Firewall, 1 Initiative Pass) Extended Test to break in.

Then he can use his Cybercombat + Attack vs Response + Firewall to try and crash the Pilot. The hacker needs to score 8 + (Pilot Rating/2) hits, 10 hits for an unmodified drone, to crash the pilot.

In this case, the hardest part is detecting the drone.
Go to the top of the page
 
+Quote Post
mfb
post Jan 30 2006, 06:41 AM
Post #28


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



QUOTE (De Bad Ass)
First, the hacker has to find the rigger and the drone in the matrix. The hacker has to complete a successful Matrix Perception Test to gain the rigger's access ID.

are you sure? i'm not familiar with the rules for this situation, but logically, commlink ID is just a form of encryption. you should be able to decrypt it on the target drone as easily as you can decrypt anything else, no need to access the drone owner's commlink at all.
Go to the top of the page
 
+Quote Post
De Badd Ass
post Jan 30 2006, 07:21 AM
Post #29


Moving Target
**

Group: Members
Posts: 619
Joined: 18-April 03
From: The UV Nexus
Member No.: 4,474



QUOTE (mfb @ Jan 30 2006, 01:41 AM)
QUOTE (De Bad Ass)
First, the hacker has to find the rigger and the drone in the matrix. The hacker has to complete a successful Matrix Perception Test to gain the rigger's access ID.

are you sure? i'm not familiar with the rules for this situation, but logically, commlink ID is just a form of encryption. you should be able to decrypt it on the target drone as easily as you can decrypt anything else, no need to access the drone owner's commlink at all.

The hacker only needs the accessID to spoof. I amended my previous post.

In any case the hacker needs to locate the drone on the net. If the drone is operating in hidden mode, this means the electronic warfare + scan test to locate a hidden node (the drone).

The rigger can buy microdrones at 1,000 yen a pop; equip them with pirated copies of his stealth 3 program, and turn them loose in hidden mode. The rigger can give them the exact same persona that he gave to his Steel Lynx. For the price of a rating 4 pilot upgrade, the rigger can buy 10 rating 3 decoys.

Logically, the hacker has a one in twelve chance of locating the Steel Lynx first. (Eleven drones and a rigger commlink). Otherwise, he can waste time crashing the Kanmushi's.

Of course, if the rigger is on a spy mission, then maybe the Kanmushi's aren't decoys at all. The hacker has to crash eleven Kanmushi's before one reahes the objective. Again, the rigger can buy 10 additional Kanmushi's for the same price it would cost to upgrade the pilot on the first one.

Then the hacker makes an opposed matrix perception test against the node, and a hacking + exploit extended test to break in.

After breaking in, the hacker can use his attack program to crash the pilot.

Of course, if the drone has an auto reboot.... I wonder how long it takes to start Windows CE 2070.
Go to the top of the page
 
+Quote Post
mfb
post Jan 30 2006, 02:44 PM
Post #30


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



QUOTE (De Badd Ass)
The rigger can buy microdrones at 1,000 yen a pop; equip them with pirated copies of his stealth 3 program, and turn them loose in hidden mode. The rigger can give them the exact same persona that he gave to his Steel Lynx. For the price of a rating 4 pilot upgrade, the rigger can buy 10 rating 3 decoys.

the problem i see with that tactic is that the rigger would have no way of commanding his lynx without also commanding the decoys, which would be slamming into walls, bonking random pedestrians in the eye, etcetera. he could turn off the drones' ability to recieve instruction, but then he'd have to go around and collect them all manually after the run; plus, it'd be cake for an opposing hacker to find the lynx--just look for the one that's processing instructions recieved via radio. it'd take a while, i guess, and that might be worth it in and of itself, depending on the situation.
Go to the top of the page
 
+Quote Post
DireRadiant
post Jan 30 2006, 02:57 PM
Post #31


The Dragon Never Sleeps
*********

Group: Admin
Posts: 6,924
Joined: 1-September 05
Member No.: 7,667



Aren't there subscription limits?
Go to the top of the page
 
+Quote Post
Aku
post Jan 30 2006, 03:08 PM
Post #32


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



yes, system*2 i beleive, but i think that only limits the number you can have active at the time, meaning, you could have a van full of drones, but still only have 8 or 10 out at a time, but if one goes down you subscribe to the next one and send it out.

i think.
Go to the top of the page
 
+Quote Post
De Badd Ass
post Feb 27 2006, 11:31 PM
Post #33


Moving Target
**

Group: Members
Posts: 619
Joined: 18-April 03
From: The UV Nexus
Member No.: 4,474



QUOTE (mfb)
QUOTE (De Badd Ass)
The rigger can buy microdrones at 1,000 yen a pop; equip them with pirated copies of his stealth 3 program, and turn them loose in hidden mode. The rigger can give them the exact same persona that he gave to his Steel Lynx. For the price of a rating 4 pilot upgrade, the rigger can buy 10 rating 3 decoys.

the problem i see with that tactic is that the rigger would have no way of commanding his lynx without also commanding the decoys, which would be slamming into walls, bonking random pedestrians in the eye, etcetera. he could turn off the drones' ability to recieve instruction, but then he'd have to go around and collect them all manually after the run; plus, it'd be cake for an opposing hacker to find the lynx--just look for the one that's processing instructions recieved via radio. it'd take a while, i guess, and that might be worth it in and of itself, depending on the situation.

1. The drones all have a Pilot program, they can operate autonomously.

2. Networked computers know how to receive and ignore messages not addressed to them. It is the nature of wireless that a receiver receives everything transmitted on the frequency it is listening on. All that is required is an address in the packet header.

3. Hacking a commlink is just like hacking one specific cellphone: difficult if you know the location and telephone number of the cellphone in question, and a lot more difficult if you don't.

4. Hacking a commlink is like hacking one specific computer over the internet: difficult if you know the IP address and the MAC address, and a lot more difficult if you don't.
Go to the top of the page
 
+Quote Post
De Badd Ass
post Feb 27 2006, 11:37 PM
Post #34


Moving Target
**

Group: Members
Posts: 619
Joined: 18-April 03
From: The UV Nexus
Member No.: 4,474



QUOTE (Aku)
yes, system*2 i beleive, but i think that only limits the number you can have active at the time, meaning, you could have a van full of drones, but still only have 8 or 10 out at a time, but if one goes down you subscribe to the next one and send it out.

i think.

If all else fails, the rigger can buy a second commlink.
Go to the top of the page
 
+Quote Post

2 Pages V  < 1 2
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 1st February 2026 - 11:53 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.