![]() |
![]() ![]() |
![]() |
![]()
Post
#1
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,073 Joined: 23-August 04 Member No.: 6,587 ![]() |
Skill wires rort.
Skill wires for a hacker It has been previously demonstrated that a hacker at char gen can be truly 133t. Capable of hacking into almost any host. Some tricks of arcetecture can beat him but only on very high security systems. In game, after saving enough money a hacker could without real difficulty obtain skill wires 4, especially if he dose so legally using a sin (real or fake). After doing so a well built hacker could easily hack into an online store that sells skill wires, insert a purchase order for the full inventory, immediately receive the electronic transfer of the programs, remove the purchase order from the system, remove the record of delivery, double check to ensure there are no other logs and leave no evidence that he was ever there. Instant shill wire based combat hacker (assuming stats where reasonable to start with). If he makes a mistake he is naturally in a moving vehicle and using a suitably anonymous COM link and capable of trying again with another provider of that service. Is this possible? Is this reasonable? What can a GM do to make this not be the complete rort that it appears to be? |
|
|
![]()
Post
#2
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,430 Joined: 10-January 05 From: Fort Worth, Texas Member No.: 6,957 ![]() |
He can simply explain to his players that words like "rort" don't exist and then move on with his game. ;)
|
|
|
![]()
Post
#3
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,283 Joined: 17-May 05 Member No.: 7,398 ![]() |
Just put lots of high-rating Black IC on the node. Those softs are worth several thousand :nuyen: apeice, they'd be insane if they didn't put lots of security on the node.
|
|
|
![]()
Post
#4
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,430 Joined: 10-January 05 From: Fort Worth, Texas Member No.: 6,957 ![]() |
In a world where hackers fall out of trees and it takes specific architectural tricks to combat them, those tricks are probably fairly common.
|
|
|
![]()
Post
#5
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,073 Joined: 23-August 04 Member No.: 6,587 ![]() |
No amount of ice will protect it from a hacker with skill 6 exploit specialisation, prog 5, running hot sim and hacking in slowly, assuming system rating 5 (the highest that is reasonable, although its not much harder on a system 6) there is a very low chance intrusion will be detected gaining admin access, if it is the hacker can try again on one of the many other nodes offering the same service, never having bothered to engage the ice.
Being a node that is involved in high speed eCommerce the architectural tricks to defend against these types of incursions are inappropriate. Edward |
|
|
![]()
Post
#6
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,430 Joined: 10-January 05 From: Fort Worth, Texas Member No.: 6,957 ![]() |
Then eCommerce will possibly collapse as a viable purchasing capability. You don't sell stuff by dropping it on the street corner and walking away with the hopes that someone will pay for it instead of just picking it up and walking away.
|
|
|
![]()
Post
#7
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,283 Joined: 17-May 05 Member No.: 7,398 ![]() |
Yes, IC is effective. Remember Teamwork tests. When you have 20 Rating 6 IC Programs actively looking for unautorized users, anyone who gets in is going to be spotted (The lead one will be rolling, on average, 84 dice). He is then going to die.
|
|
|
![]()
Post
#8
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 7,089 Joined: 4-October 05 Member No.: 7,813 ![]() |
actually, when you have 20 rating 6 IC programs on the node, the node will go down to response 1 and so will all that IC.
perhaps you should instead consider the possibility of patrolling security hackers, each with agents on patrol as well. |
|
|
![]()
Post
#9
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,430 Joined: 10-January 05 From: Fort Worth, Texas Member No.: 6,957 ![]() |
Plus IC can't use teamwork tests, only characters.
|
|
|
![]()
Post
#10
|
|
Moving Target ![]() ![]() Group: Members Posts: 351 Joined: 17-February 06 From: San Francisco Member No.: 8,275 ![]() |
In the Sixth World Wiki it describes "Hacker House", a cool Matrix locale where you can apparently buy just about any program you desire, but they don't have any full programs on the server. You buy it and then pick up a datachip that someone drops off for you.
It seems that any secure server won't be accessible via the Matrix. If something valuable like skillsofts, purchase orders or bank information is stored on it, it likely doesn't even have a wireless connection, just a physical one that is physically plugged in as needed, that's an easy way to get around any hacker, no matter how badass he is. |
|
|
![]()
Post
#11
|
|
Moving Target ![]() ![]() Group: Members Posts: 351 Joined: 17-February 06 From: San Francisco Member No.: 8,275 ![]() |
whoops
|
|
|
![]()
Post
#12
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,000 Joined: 17-November 05 From: Halifax, Canada Member No.: 7,975 ![]() |
My questions are:
1) Why would a hacker bother with Skillwires? A properly built leet hacker isn't going to have the strength or body to deal with little more than the technical Skillwire sets. Good for driving and drone rigging I suppose. 2) How do you think that downloading that much data is going to be instantaneous when the online node as to a) validate the purchase b) confirm billing information and c) transfer the data, that much information isn't instantaneous. (most likely via chip delivery unless you're a AA+ corporation) 3) What makes you think that the node is going to have a low level firewall? 4) Even you're omni-potent Exploit 6 isn't infallable against a store with high a high level firewall.. particularly the purchasing server. Then there's always a chance to glitch or critical glitch your hacking test, and no amount of Exploit is going to save your meat from BlackIC. and last of all 5) Hope you're hacker has a lotta cash, cause what you want ain't cheap chummer. |
|
|
![]()
Post
#13
|
|||
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,754 Joined: 9-July 04 From: Modesto, CA Member No.: 6,465 ![]() |
Color me a newb, but what's "rort" mean? |
||
|
|||
![]()
Post
#14
|
|
Moving Target ![]() ![]() Group: Members Posts: 565 Joined: 7-January 04 Member No.: 5,965 ![]() |
i just looked on google... aparently its australian, and means to take 'unfair advantage of a public service'.
|
|
|
![]()
Post
#15
|
|
Target ![]() Group: Members Posts: 79 Joined: 18-September 05 Member No.: 7,758 ![]() |
wouldn't a better trick be to hack some wage slave's comlink, drive the poor SOB into heavy debt ordering your Skips, then move them from his comlink to your own.
|
|
|
![]()
Post
#16
|
|||
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 ![]() |
That would probably be easier since all you do is hack the commlink, crack the encryption on the SIN information and then gain access everything there is to know…except the passwords. IF you are lucky then you have an average joe with saved passwords on his commlink but most likely there’s a limit on how much you can buy on pure wireless without a physical identification and an acceptance of the transaction. Still, it might be possible – it’s just a matter of finding that wireless commlink with a crappy security and saved passwords on it…and considering how many people today has crap security on their wireless networks… |
||
|
|||
![]()
Post
#17
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,000 Joined: 17-November 05 From: Halifax, Canada Member No.: 7,975 ![]() |
Yeah the 6+ Firewall rating to hack into the encrypted portion of the commlink that holds the SIN and bank PINs is waaaay easier than making a purchase with a fake SIN....
I don't think so. |
|
|
![]()
Post
#18
|
|||
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 ![]() |
The ”easy” part is that you use Average Joe’s bank account so it won’t cost you anything. Even if you got a fake SIN you would still need money. |
||
|
|||
![]()
Post
#19
|
|||
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 ![]() |
The usual protection on average joes commlink is usually a rating 3 Firewall and Response 3. The encrypted information seems to be stored in a part of the commlink independent of the response rating of the commlink since all encryption regarding SIN’s is at a rating 5. This means that hacking the commlink would be a low threshold of 6. After the commlink has been hacked (let’s assume Admin access) we decrypt (if needed unless we find the passwords) with a threshold of 10 (encryption X2). This would probably be a valid tactic for smaller purchases since one could transfer cash from their accounts instantly over to a certified credstick and then spoof the traffic. |
||
|
|||
![]()
Post
#20
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,000 Joined: 17-November 05 From: Halifax, Canada Member No.: 7,975 ![]() |
Just how many dice are you rolling that you don't even hesitate in saying that gaining 6-10 successes on a roll is a cake walk? Either that, or you're not reading threshold rules properly.
|
|
|
![]()
Post
#21
|
|||
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 ![]() |
Oh, I never said it was a cakewalk. Hacking an average joes commlink for a shadowrunner hacker (skill 6 Program 5) specialization (exploit +2) would roll 13-15 dice if doing full VR WOULD be a cakewalk. The encryption would be a bit harder. Hacking Commlink of Average Joe Hacker would roll an extended test against Firewall+Analyze (IF the program is loaded) and those would mostly be 3 so the threshold is 6. Hacker rolls 15D6. Target commlink may do 1 test against the Stealth program of the hacker (Treshold 5 with 6D6). Cracking Encryption Now, every combat turn said hacker might do a decrypt (without a key) at a threshold of say 10. He rolls Hacking+Decrypt (6+5) once every combat turn until success. If the commlink has IC, Agents or even a user present using Analyze programs they can find you by rolling against your Stealth programs. If they have no user online or no program running they MIGHT be found out if they glitch the test (gamemasters discretion) |
||
|
|||
![]()
Post
#22
|
|
Moving Target ![]() ![]() Group: Members Posts: 801 Joined: 13-March 06 Member No.: 8,374 ![]() |
I would think that every company of level A or higher would exploy a Technomancer of some skill. Said technomancer, who is being hired to pwn any hackers who come along, would most likely bring sprites, and have spirtes encypt all the most valuable information as only sprites can. I don't care how high your skills are, when you have aa team of high level sprites patrolling, chances are you will be found and killed. cause lets face it, it takes a real nova hacker to take down a fault sprite at level 6 or higher.
|
|
|
![]()
Post
#23
|
|
Great, I'm a Dragon... ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Retired Admins Posts: 6,699 Joined: 8-October 03 From: North Germany Member No.: 5,698 ![]() |
Technomancers are not that common.
|
|
|
![]()
Post
#24
|
|||
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 ![]() |
Now, remember. I’m talking about hacking the “average joe” on the street. In the case of corporations that the runners are infiltrating it’s up for the GM to crank up the defenses. ^__^ |
||
|
|||
![]()
Post
#25
|
|||
Technomancer ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 ![]() |
True, but that just makes them in higher demand :) |
||
|
|||
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 31st May 2023 - 12:16 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.