IPB

Welcome Guest ( Log In | Register )

6 Pages V  < 1 2 3 4 > »   
Reply to this topicStart new topic
> Another realitybraker, subscription rule kills wireless hacking
hobgoblin
post Feb 16 2006, 01:52 PM
Post #26


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (Serbitar)
QUOTE (MaxHunter @ Feb 16 2006, 08:37 AM)
Personally, I go the way Synner does. In our game linked devices (nodes) can be hacked via spoof.

Procedure:
1. Take a matrix perception test to Analyze the exchange.
2. Spoof one of the devices into thinking you are its linked counterpart
3. Once inside Edit/Command/Crash (attack) at leisure.

So, in your interpretation, you can hack drones, subscribed to a PAN, simply by just spoofing the PAN?

Can you back this up by BBB quotes ?

AND this means that the subscriber rule doesnt actually do anything. You can still hack every device.
Would be fine for me.

they do something tho, they add a extra step :P

hmm, now that i think about it, could one use a drone to do the signal interception for the spoof? ie, insert a small drone into the area, log into the drone over the matrix, then use it as a signal router and spoof the device.

makes me realy want to invest in those microdrones (fly on the wall have never been more correct :silly:).
Go to the top of the page
 
+Quote Post
hobgoblin
post Feb 16 2006, 01:56 PM
Post #27


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (Ryu)
@Synner: I´m not confusing AR and VR - I think. In VR, any device is a node, and any node can be entered in VR, or did I misunderstand? What would stop me from illegally accessing a node on the fly in VR (+2 dice) and hiding in the coffeemaker until any hackers left the house terminal? Any camera on a security PAN would be safer than the controlling terminal just because cameras can´t support worthwhile defense programs.

being a node is independent of VR or AR mode. a node is a device that can talk directly to the matrix. or atleast thats my take on it.

so if there is a node out there, you can access it both via AR or VR. if your going to hack it however, i would suggest going VR, unless your meat is realy wired for speed.
Go to the top of the page
 
+Quote Post
Ranneko
post Feb 16 2006, 02:01 PM
Post #28


Moving Target
**

Group: Members
Posts: 349
Joined: 16-January 05
Member No.: 6,984



QUOTE (Serbitar)
How do you do this? The coffe device does not interact with you. You cant even start to spoof.

A subscribed object only accepts commands from a specific signal or set of signals.

Spoofing is the process of mimicing the signal that the object will accept commands from.

So you are able to start trying to spoof a device that isn't subscribed to you, that is the point of spoof.

Spoofing however does require you to know the matrix ID of the person who's device you are trying to spoof, which requires a successful Matrix Perception Test (pg 224).

This means that you can create choke points yes, but those choke points can be sidestepped with the right maneuvers.
Go to the top of the page
 
+Quote Post
Synner
post Feb 16 2006, 02:27 PM
Post #29


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



QUOTE (Serbitar @ Feb 16 2006, 01:15 PM)
QUOTE ("Synner")

You're missing the point. While two devices can be programmed to only recognize each other the connections themselves are "unhackable", the devices themselves aren't (unless they're not connecting to the Matrix at all).

You hack devices over their connections. If all the conncetions to the device are unhackable, the device is unhackable.

This is only partially correct. Wireless connections are broadcast and receptor systems which means there is no such thing as secure two-way communication. In SR4 what keeps one device from recognizing anything but another specific system is security software (Firewall) and registered accounts/IDs. These can be forged with the appropriate tools (including Spoof) or by first acquiring the valid account passcodes, etc.

Note there are specific requisites to successfully Spoof something so sometimes it isn't possible, but the quote you want (relating specifically to drones) is on p.224.

QUOTE
QUOTE
There's two ways of hacking these. You go to the device itself and Spoof it into thinking you are the device its authorized to recieve from.

You mean physically? (wirelessly you cant, it wont accept your connection) Not an option. We want wireless hacking.

It won't recognize you as a valid user because you don't have a valid account, which is something slightly different. There are ways of brute forcing your way through Firewalls, spoofing devices and forging accounts in the rules.

QUOTE
QUOTE
Or (assuming one or the other is connected to the Matrix) you hack that one to get to the other (as has been mentioned elsewhere most runners would use this chokepoint configuration).

That leasds directly to the cockepoint solution.

And there's nothing wrong with it. You hack whatever node is connected to the Matrix (normally the personal commlink) and slip in through that.

QUOTE
Limiting your access to a single service provider just makes you easier to track anyway.
QUOTE
Does  Joe 2070 care? We are not talking about runners, but about people who are getting hacked by runners. Or not anymore, because of the unhackable connection rule . . .
BTW: Please discribe your "spoofing" rules in connection with the "subscriber" rule. If you can spoof for example comlink codes, to acess devices (cyberware) connected to a comlinks PAN, then the "subscriber" rules is useless and should be skipped.

As Tinker has correctly pointed out by RAW you can only really spoof devices with agents and pilot progs. However, by RAW you can also brute force your way through the Firewall or forge an account. Note, also by RAW, every device has a Firewall (simplified into the Device Rating) and so can be brute-forced.

All the subscriber rule defines is the use of "chokepoints", particularly with regards to commlinks. The fact that a commlink is logged onto the open Matrix means its hackable. You target it and hack the firewall and from there potentially have access to its entire subscription list. If you limit your link to recieveing incoming from only one ID (such as the MSP) then you're isolating yourself from all the functionality of being wireless in the first place - you won't be getting direct broadcasts from people, stores and devices around you which is the whole reason why Joe 2070 uses a commlink.
Go to the top of the page
 
+Quote Post
TinkerGnome
post Feb 16 2006, 02:45 PM
Post #30


Dragon
********

Group: Members
Posts: 4,138
Joined: 10-June 03
From: Tennessee
Member No.: 4,706



QUOTE (Ryu)
@TinkerGnome: Spoofing is Hacking+Spoof against Pilot+Firewall. See "Using hacking skill"

This works only against drones and agents by RAW (and doesn't even work upstream).

Just because everything is wireless doesn't mean that everything should be easy to hack. I mean, people raise the issue about SR4 all the time that now ever moron with a commlink and a bit of hacking skill can cause all kinds of problems for society at large.

You should have to hack someone's commlink to get access to their smartlink. Hackers are more viable now, but they shouldn't be gods among men. A hacker with a few hours on his hands can VR over to any system attached to the Matrix and just about always break inside without detection (using the non-brute-force method). Hacking a matrix connection node isn't that hard, it just takes time. The same thing with a commlink.
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 16 2006, 03:01 PM
Post #31


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (Synner @ Feb 16 2006, 09:27 AM)

All the subscriber rule defines is the use of "chokepoints", particularly with regards to commlinks. The fact that a commlink is logged onto the open Matrix means its hackable. You target it and hack the firewall and from there potentially have access to its entire subscription list. If you limit your link to recieveing incoming from only one ID (such as the MSP) then you're isolating yourself from all the functionality of being wireless in the first place - you won't be getting direct broadcasts from people, stores and devices around you which is why Joe 2070 uses a commlink

You do. I described the procedure above.

What the chokepoint system destroys is the "I can see it, I can hack it" philosophy of SR4. With the chockepoint system, the hacker wont be able to hack that security camera (car, sensor, laser beam, maglock) over there. He will have to go through the heavily protected secnode. Then we are back at SR3 hacking.

But you still owe me an answer: Can I hack smartlink (provided I am near enough) without hacking (by spoofing or whatever) the comlink first, or can I not? And why.
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 16 2006, 03:06 PM
Post #32


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (TinkerGnome)
You should have to hack someone's commlink to get access to their smartlink. Hackers are more viable now, but they shouldn't be gods among men.

Your smartlink is more than enough protected by the low signal rating. Somebody would have to stay 3 meters next to you to do this AND there is skinlink. No extra rule needed.

No need to sacrifice SR4 wireless hacking for this.
Go to the top of the page
 
+Quote Post
Darkness
post Feb 16 2006, 03:11 PM
Post #33


Moving Target
**

Group: Members
Posts: 297
Joined: 26-February 02
Member No.: 248



QUOTE (Serbitar)

So, in your interpretation, you can hack drones, subscribed to a PAN, simply by just spoofing the PAN?

Can you back this up by BBB quotes ?

AND this means that the subscriber rule doesnt actually do anything. You can still hack every device.
Would be fine for me.

I give you a quote to consider:
QUOTE (SR4 @ p. 224, Spoof Command)
Use the Spoof Command action to transmit forged instructions to an agent or drone controlled by another user. In order to spoof orders, you must first complete a successful Matrix Perception Test on the persona you are impersonating in order to gain its access ID.
To spoof commands, you must beat the agent or drone in an Opposed Test between your Hacking + Spoof and the target’s Pilot + Firewall. If successful, the target drone or agent believes the orders came from its controlling persona.

Granted, this text only specifically mentiones agents and drones, but any other device wouldn't be much different (maybe even easier).
The subscriber rule mentiones, that two devices must "know" each other to allow communication between those two.
Question is: How, do they know each other?
Possible, and iMHO most likely, answer based on data in BBB: By the access ID each device has.
The Spoof Command Rule states that you can get this access ID by a sucessfull Matrix Perception Test of the Persona in Question. Once you have this access ID, you can impersonate it. One other possible stepstone would then be an encryption Layer over the communication, which first must be unencrypted, to send a command.

I conclude from this, that:
a) A connection is secure, unless the access ID of the "controller" is known.
b) Once said access ID is known, you can do whatever you want with the "recipient".

What does this mean for everyday hacking (everything IMHO)?
Once you spot a Drone or simmilar thing, the hacker should try to locate the node, said drone communicates with. You may not be able to listen into it, or send on the same "frequency" but you know it is there, and you can locate it, using Electronic Warfare Rules.
Once you pinpointed the physical location of the nearest node a Device/Drone/Agent communicates with, you try to get a good look at it (matrix wise). This gives you the access ID, and on you go.

In the case of an enemy hacker, his signal range will possibly be wide enough (he sends commands to the drone), that you can do a matrix perception roll on him, without even moving, since you are already in his range.
If you aren't you have to go closer, either through the matrix, logging into a closer node, or physically, moving your commlink into his range.

In the case of a security network, i assume that most nodes will have a quite low signal rating to force intruders to come close to other security measures. But the node controlling (or relaying) the commands to a Drone (for instance) should have a - slightly - larger range, since it must communicate with a drone flying around. Large enough that you can get a "matrix look" at it, once you enter it's signal range.

Other devices, like maglocks for instance, may be set to accept wireless connections from other sources (RFID-Tags, for instance), opening a possible way to exploit those "holes" to hack this device, since they aren't set to a specific access ID.

So, yes the subscriber rule makes it difficult to influence devices that are set to accept only wireless connections from a specific source, but once you are in range to that controlling node, you can make a Matrix Perception Roll on that node, getting it's access ID. With that you can start to fool the device.

So, to secure something, one has to subscribe ones devices to specific nodes AND use encryption AND keep a low signal rating, to force intruders to come close enough, that it becomes dangerous for them. Sometimes all of it (especially the range part) simply isn't possible.
The subscriber list is only one part - which can be overcome - to slow down intruders.
Go to the top of the page
 
+Quote Post
mintcar
post Feb 16 2006, 03:12 PM
Post #34


Karma Police
***

Group: Dumpshocked
Posts: 1,358
Joined: 22-July 04
From: Gothenburg, SE
Member No.: 6,505



Routing traffic through a security node in a way that does not limit your functionality must be kind of hard. Even configuring a firewall not to stop things you might want to get through is a bit tricky for someone with poor computing skills like me.
Go to the top of the page
 
+Quote Post
mintcar
post Feb 16 2006, 03:23 PM
Post #35


Karma Police
***

Group: Dumpshocked
Posts: 1,358
Joined: 22-July 04
From: Gothenburg, SE
Member No.: 6,505



Darkness: Using electronic warfare to locate the controling node of a device is not the only way. Unless you're in a hurry, the most likely way of doing it may be through legwork and data searches. If you find out through rumors or sniffing out some old Access ID logs, you don't have to stroll around using your commlink as a radar.

The real question though, is can you peceive the persona without first hacking the node? I don't think the Access ID of a node is publicly listed, so you propably have to get in.
Go to the top of the page
 
+Quote Post
Darkness
post Feb 16 2006, 03:34 PM
Post #36


Moving Target
**

Group: Members
Posts: 297
Joined: 26-February 02
Member No.: 248



QUOTE (mintcar @ Feb 16 2006, 04:23 PM)
Darkness: Using electronic warfare to locate the controling node of a device is not the only way. Unless you're in a hurry, the most likely way of doing it may be through legwork and data searches.  If you find out through rumors or sniffing out some old Access ID logs, you don't have to stroll around using your commlink as a radar.

That's just another way. But yes, you're right of course.
QUOTE (mintcar)
The real question though, is can you peceive the persona without first hacking the node? I don't think the Access ID of a node is publicly listed, so you propably have to get in.

You don't have to actually access a node to scan it. As a node it sends out signals, which can be interpreted, and define its "persona" for those "looking" at it. Once you get the signals, your commlink will interpret them for you, displaying the icon.
And the node will send out it's access code somehow. And unless a directional link is used (unlikely), in all directions possible. It has to, unless the "recipient" couldn't receive it himself.
So your commlink will pick it up. The Matrix Perception Test is nothing else, but to see this specific data piece between all the rest, the node sends out. The rest (like threshold 'nd stuff) is coverd in Matrix Perception, p. 217.
Go to the top of the page
 
+Quote Post
kigmatzomat
post Feb 17 2006, 04:52 PM
Post #37


Moving Target
**

Group: Members
Posts: 914
Joined: 26-August 05
From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.)
Member No.: 7,626



QUOTE (Serbitar)
[QUOTE=Synner,Feb 16 2006, 09:27 AM]
But you still owe me an answer: Can I hack smartlink (provided I am near enough) without hacking (by spoofing or whatever) the comlink first, or can I not? And why.

The answer is: It is possible but you have to be close....reallly, really close.

IF the smart linked device is using wireless (but not skinlink) AND you are within signal range of the smart linked device then you can attempt to hack the commlink. (Since this is a 2-way communication you have to be in range of the weaker device, in this case the smart link)


If they are using skinlink you could do the same thinks *IF* you are touching them the
whole time.

IIRC you first have to locate the signal with a Scanner, make an Electronic Warfare + Decrypt attempt vs. any encryption, followed by a Matrix Perception test of the Comm and finally you make a Spoof check.


This has already been gone over in one of the many "how do I hack subscribed drones" threads. Do a search and you should find one (or more) that have the required tests and page references.
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 17 2006, 05:02 PM
Post #38


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



Thanks for the info. I didnt know that there were such threads.
Go to the top of the page
 
+Quote Post
Deadjester
post Feb 17 2006, 06:08 PM
Post #39


Target
*

Group: Members
Posts: 89
Joined: 29-January 06
From: Orlando, Florida
Member No.: 8,210



I would still think there are areas of security that are not open to the wireless eviroment and you would have to break in the old fashion way and then access it.
Go to the top of the page
 
+Quote Post
Shrike30
post Feb 17 2006, 08:09 PM
Post #40


Runner
******

Group: Members
Posts: 2,556
Joined: 26-February 02
From: Seattle
Member No.: 98



They talk about this in some places... things like wireless-blocking walls are pretty common. I've constructed servers where you had to actually be in the room, physical data busses that are *manually* opened and closed at specific times of day for synchronization of data between systems, security systems that haven't been updated to use wireless (that is, they talk to their main computer with wires), Closed Circuit TV (instead of Wireless TV) surveillance... and of course, some of the serious military types have gotten tired of the issues associated with wireless and the modern battlefield (IE, the enormous amount of jamming flying around all the time) and still use the oldschool hard-wired smartgun links. Wireless is a nifty piece of tech, but the whole world can't *afford* to upgrade in a 5 year span.

Tons of the old stuff is still around, and you should feel free to make life interesting for your hackers. Don't make all those BP they spent on being ready to take on a wireless network totally useless... but don't feed them the easy "hax0r in the bathroom" solution every time, either.
Go to the top of the page
 
+Quote Post
neko128
post Feb 18 2006, 02:23 AM
Post #41


Moving Target
**

Group: Members
Posts: 327
Joined: 28-January 06
Member No.: 8,209



QUOTE (Serbitar)
So, in your interpretation, you can hack drones, subscribed to a PAN, simply by just spoofing the PAN?

Can you back this up by BBB quotes ?

AND this means that the subscriber rule doesnt actually do anything. You can still hack every device.
Would be fine for me.

The BBB defines spoofing, on page 224, as forging commands to agents and drones controlled by another persona. On page 238, under drones, it specifically says that to control a drone, it MUST be linked to you as a subscriber. So pretty much... Spoofing is nothing more than sending a message that is falsely identified as issued by someone else - and we have a specific example of it functioning against a subscribed object. However, it only refers to sending commands, not hacking into them or something similar. So this could easily be extended to say that you could send a spoofed command to a Smartlink subscribed to a Commlink, for example, but accessing data files on someone's subscribed cybereye wouldn't be the same thing.

It's also worth noting, though, that there's other things to this. While spoofing lets you falsely identify yourself as someone else, you must already have decrypted the communications link and such.

So no... Subscribing isn't useless, by any stretch; it adds an extra level of difficulty to any attempt to command something communicating by subscription. It just isn't foolproof.
Go to the top of the page
 
+Quote Post
neko128
post Feb 18 2006, 02:26 AM
Post #42


Moving Target
**

Group: Members
Posts: 327
Joined: 28-January 06
Member No.: 8,209



QUOTE (Deadjester)
I would still think there are areas of security that are not open to the wireless eviroment and you would have to break in the old fashion way and then access it.

Yup. Page 256: "...High-security systems will avoid wireless altogether, sticking to an internal wired network that is either completely isolated from the Matrix, or linked via secure gateway networks, perhaps through carefully timed and temporary connections."
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 18 2006, 03:02 AM
Post #43


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



I made up my mind.

SR4 wanted to simplify hacking. The subscriber rule makes it too complicated, by adding just another layer, which could easily represented by just a higher firewall rating. So I skip it.

Most systems where the rule would have made sense are protected by low signal rating, skinlinking, or radio blocking paint anyways.
Go to the top of the page
 
+Quote Post
hobgoblin
post Feb 18 2006, 07:32 AM
Post #44


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



unless the number of pan devices count towards the total number of subscriptions you can have (and that to me is a bit silly as it forces a street sam to have about the same comlink as a rigger, just to manage his cyberware), yes its a bit over the top and mostly a kind of fluff text.
Go to the top of the page
 
+Quote Post
Synner
post Feb 18 2006, 09:02 AM
Post #45


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



QUOTE (hobgoblin)
unless the number of pan devices count towards the total number of subscriptions you can have (and that to me is a bit silly as it forces a street sam to have about the same comlink as a rigger, just to manage his cyberware), yes its a bit over the top and mostly a kind of fluff text.

Yes, all devices do count towards the total number of subscriptions but, no, it shouldn't have much, if any, impact on a samurai since his cyberware is controlled via DNI and not wireless. I'm going to say this one more time because people seem to have misread it: wireless did not replace DNI in function, it's use is complementary. Motor control of your cyberarm is still DNI, there is no reason for making it wireless. Most cyberware does also possess wireless functions, but mostly to run system diagnostics or interface with implanted gear (such as a cybersmartgun, etc) - there are three different points in SR4 where the common functions of wireless in cyberware are mentioned.
Go to the top of the page
 
+Quote Post
hyzmarca
post Feb 18 2006, 09:02 AM
Post #46


Midnight Toker
**********

Group: Members
Posts: 7,686
Joined: 4-July 04
From: Zombie Drop Bear Santa's Workshop
Member No.: 6,456



QUOTE (neko128 @ Feb 17 2006, 09:23 PM)
So this could easily be extended to say that you could send a spoofed command to a Smartlink subscribed to a Commlink, for example, but accessing data files on someone's subscribed cybereye wouldn't be the same thing.


Of course it would be. Accessing a file is simply sending a command that states "send me this file". The cybereye will address the data transmission to the device being spoofed, of course. But, since broadcast is a wireless medium, it is rather simple to intercept anything addressed to that device.
Go to the top of the page
 
+Quote Post
hobgoblin
post Feb 18 2006, 10:52 AM
Post #47


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



QUOTE (Synner)
QUOTE (hobgoblin @ Feb 18 2006, 07:32 AM)
unless the number of pan devices count towards the total number of subscriptions you can have (and that to me is a bit silly as it forces a street sam to have about the same comlink as a rigger, just to manage his cyberware), yes its a bit over the top and mostly a kind of fluff text.

Yes, all devices do count towards the total number of subscriptions but, no, it shouldn't have much, if any, impact on a samurai since his cyberware is controlled via DNI and not wireless. I'm going to say this one more time because people seem to have misread it: wireless did not replace DNI in function, it's use is complementary. Motor control of your cyberarm is still DNI, there is no reason for making it wireless. Most cyberware does also possess wireless functions, but mostly to run system diagnostics or interface with implanted gear (such as a cybersmartgun, etc) - there are three different points in SR4 where the common functions of wireless in cyberware are mentioned.

so, if i have display contacts and a smartlink. setting this all up via a comlink will require a rating 2 comlink if i want to be able to access nodes, drones, or for that matter other peoples comlinks?

i dont know why, but that sounds flat out silly to me...
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 18 2006, 12:05 PM
Post #48


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (Synner)
Yes, all devices do count towards the total number of subscriptions

Only Drones, Agents and Nodes coutn towards the subscription limit.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Feb 18 2006, 12:16 PM
Post #49


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



There is no Subscription limit.

There is only a limit to active Subscriptions at a time.

That applies to any connection.
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 18 2006, 12:27 PM
Post #50


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



That would make everything, even a smartlink and contact lenses a full blown node.
Doesnt sound so good.

Including the gun, a smartlink user would already use up 3 nodes.

For simplicity I would only make active drones, agents (things with a pilot or agent rating) and nodes the hacker is acessing actively via VR/AR counting to the subscriber limit.
Go to the top of the page
 
+Quote Post

6 Pages V  < 1 2 3 4 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 1st February 2026 - 09:24 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.