IPB

Welcome Guest ( Log In | Register )

3 Pages V   1 2 3 >  
Reply to this topicStart new topic
> Hacking my way
Serbitar
post May 8 2006, 11:58 AM
Post #1


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



This is the first post in a series, where I want to present my interpretation of hacking runs.
With several posts (all int his thread) I want to cover several situations, and my interpretation of how the matrix rules can be used and balanced.

(might not be the order of final posting)
Hacking a host and performing a data steal
Hacking through a relay of linked nodes
Hacking a security camera and performing overwatch
Hacking someone's wireless equipment
Hacking into a drone network

TODAY: Hacking a host and performing a data steal
Note that this is only my interpretation and not final. I might edit this post a lot during the next days, depending on comments and other considerations, but I will note changes by using different colours and maintaining a changelist.

General comments:

Deleted subscriber house rule

1.) When you successfully hack in, you have a valid user/security/admin account for this session only. When you leave the node, your account has gone. Legal actions (actions covered by the permissions of the account) can be performed by a simple computer+skill test (if needed at all). Illegal actions (actions not covered by the permissions of the account) must be perfomred by an opposed hacking+skill test vs. system+firewall of the node. The GM may call for an extended oppesed test if a certain treshold has to be achieved. Net hits of the node determine that the node notices that something is being tempered with. The GM decides what happens with which number of net hits.

2.) IC/agents have to successfully detect a stealthed hacker to engage in actions (including analyzing hack attempts) against him.


(H) Hacker:
Hacking: 5 (specialization stealth)
Computer: 5

Hot-SIM: +2 dice

Firewall: 5
Response: 5
Firewall: 5
Signal: 5

Loaded programmes:

- Exploit 5
- Analyze 5
- Browse 5
- Stealth 5

Not loaded programmes:

- Edit 5



(N) Node:
Firewall: 4
System: 4
Signal: 4
Response: 4

Loaded programmes:

-Analyze 4

(IC1) IC: Patrol-1
Pilot 4
-Analyze 4
-Attack 4
-Armor 4

(IC2) IC: Patrol-2
Pilot 4
-Analyze 4
-Attack 4
-Armor 4


Steps:
(bold steps denote the minimal version of this example)

(H) Hacking In
(N) Noticing the Hack
(H) Matrix Perception
(IC1) Matrix Perception
(H) Stealth roll
(IC2) Matrix Perception
(H) Stealth roll
(H) Unload Exploit
(H) Load Edit
(H) Browsing for Data
(H) Browsing for Data
(N) Noticing the Hack
(IC2) Noticing the Hack
(H) Stealth roll
(H) Downloading the Data
(N) Noticing the Hack
(IC2) Noticing the Hack
(H) Stealth roll
(H) Logging off

Explained:

(H) Hacking In
Hacking+Exploit(Firewall, 1 Turn): 5+5+2 = 4 hits (porb. to fail hacking in in 1 turn: 39%)

The hacker is trying to hack into the node. He is going for a user account. The rules say he has to engage in a Hacking+Exploit (firewall, 1 turn) test, to do so. With his first roll he is beating the treshold and is in.


(N) Noticing the Hack
Firewall+Analyze(Stealth): 4+4 = 4 hits (prob. to notice the hacker in 1 turn: 9%)

The node is trying to notice that somebody is hacking in. He rolls, per RAW, Firewall+Analyze versus a treshold of the hackers Stealth programme. As this is a "hack on the fly" attempt, the node may roll everytime, the hacker is rolling to hack in. In our example, the hacker needed only one try, so the host may only roll once, too.
As the node scores only 4 hits, and the stealth programme of the hacker is 5, he is not noticed. The GM may note down the 4 hits, as they may act as a treshold for the hacker to clear the system logs of his hack attempt.


(H) Matrix Perception
Computer+Analyze vs Firewall+Stealth

The hacker is setting his analyze programme to constantly analyze his sourroundings. He is rolling Computer+Analyze vs. Firewall+Stealth to find stealthed IC or backdoors. For ease of gameplay, the GM is only rolling this test for stealthed objects. If the hacker wants to further examine something he has already detected to gain further information he must explicitly say so.
As the two patrolling IC are not stealthed, the hacker sees them without performing any test. The GM does not have to roll for stealthed objects, as neither the IC, nor the node, are running any stealth programmes.


(IC1) Matrix Perception
Pilot+Analyze vs Computer+Stealth: 4+4 = 3 hits

The patrolling IC Patrol-1 is set to constantly analyze the node for intruders. As the hacker has a valid user account for this session, he is no intruder, but the IC will have to detect the presence of the hacker to note any hacking actions he might undertake. As the hacker is running a stealth programme, the IC must undertake an opposed test to detect him. For ease of gameplay, this test should be rolled by the GM.


(H) Stealth roll
Computer+Stealth vs Pilot+Analyze: 5+5+2+2 = 3 hits (prob. for the hacker to get noticed: 13%)

The GM rolls 3 hits for the hacker. The IC does not detect the presence of the hacker. Unless something happens, the IC will not attempt again to detect the hacker. If the IC tryies again, it will have a -2 dice penalty for trying again.


(IC2) Matrix Perception
Pilot+Analyze vs Computer+Stealth: 4+4 = 5 hits

The second IC (Patrol-2) is trying to detect the hacker, too.


(H) Stealth roll
Computer+Stealth vs Pilot+Analyze: 5+5+2+2 = 3 hits (prob. for the hacker to get noticed: 13%)

The IC has 1 net hit in this opposed test. It has detected the hacker. As the hacker has a valid user account for this session, the IC does nothing else.


(H) Unload Exploit
Simple Action

The hacker is unloading his Exploit utility. He can only have 4 programmes running without a response penalty and wants to load an edit tool.


(H) Load Edit
Complex Action

The hacker is loading his edit tool.


(H) Browsing for Data
Computer+Browse(5, 1 Phase) 5+5+2 = 3 hits, 8 hits = 2 phases

The hacker is using his user account to browse for the file he seeks. The GM knows that the file is not listed in the directories that are accessible for normal users. He decides, that it will need an extended test (5, 1 phase) for the hacker to find, that the file is not listed in the directories. As this is a legitimate action, the ahcker uses his computer skill. After 2 phases the hacker accumulates 8 hits and is informed that the file is not listed. IC2 is constantly analyzing the hacker, but as he is doing nothing wrong, nothing happens. IC1 is not even aware that the hacker is in the node. (Note: Some very high security system might synchronize the detections of their IC, but this triggeres wrong alarms, very often. GMs, do not synchronize your IC unless you want to make your system extremely high security, as sucess probabilites for a hack decline rapidly.)

Note that the hacker is using computer+browse only because he exactly knows which file he is looking for. If he only knew which kind of information he was looking for, he might have to use the data search skill and face a much higher treshold.


(H) Browsing for Data
Hacking+Browse vs System+Firewall (1, 1 Phase) 5+5+2 = 3 hits

The hacker has not found the files in the user acessible indexes. He knows that the file is there, so he tries to hack into the full file index.
This is an illegitimate action, as accessing the full file directory would need security access. The GM decides that finding a simple file in an index is an (1, 1 Phase) extended test.

Note that the hacker would be using hacker+browse even if he only knew which kind of information he was looking for, but he might have to face a much higher treshold.


(N) Noticing the Hack
System+Firewall vs Hacking+Browse (1, 1 Phase) 8+8 = 2 hits (prob. for the hacker to get noticed: 19%)

The node is trying to detect that sombody is hacking into the file system. As the hacker achieves 1 net hit, he is finding the file in 1 phase. he GM may note down the 2 hits, as they may act as a treshold for the hacker to clear the system logs of his hack attempt.


(IC2) Noticing the Hack
Pilot+Analyze vs Hacking+Stealth 4+4 = 1 hit

IC2 is constantly scanning the node for intruders. As the hacker is now trying to o something, that is not covered by his access rights, the IC might notice it. The GM is rolling an opposed Matrix Perception test.


(H) Stealth roll
Computer+Stealth vs Pilot+Analyze: 5+5+2+2 = 3 hits (prob. for the hacker to get noticed: 13%)

The IC does not notice the hacing attempt of the hacker.


(H) Downloading the Data
Hacking+Edit vs Firewall+System (1, 1 Phase) 5+5+2 = 3 hits

The hacker is trying to download the data. As the file can only be read (and downloaded) with security access, he has to perform a hack to do it.
In his first try, he rolls 3 hits.


(N) Noticing the Hack
System+Firewall vs Hacking+Browse (1, 1 Phase) 8+8 = 2 hits (prob. for the hacker to get noticed: 19%)

The node again tries to detect the hack. It rolls 2 hits, which means the hacker achieves 1 net hit and downloads the file.


(IC2) Noticing the Hack
Pilot+Analyze vs Hacking+Stealth 4+4 = 2 hit

As the hacker is again trying to o something, that is not covered by his access rights, the IC might notice it. The GM is rolling an opposed Matrix Perception test.


(H) Stealth roll
Computer+Stealth vs Pilot+Analyze: 5+5+2+2 = 3 hits (prob. for the hacker to get noticed: 13%)

The IC does not notice the hacking attempt of the hacker.


(H) Logging off


The hacker is login off. Note that the node accumulated 8 hits during the hack. This means, the hacker left lots of evidence of his activities in the node.



Discussion:

This was an example of a competent hacker (all ratings 5), hacking into a high traffic database (node 4) with good security (analyze 4, 2 patrolling IC).
To achieve his run unnoticed he had to hack in in 1 turn (giving the node 2 tries to achieve his stealth treshold of 5 would result in a 66% chance of being detected). Hacking in in 1 turn left him with a 9% chance of being detected.
In the node he had to do 2 opposed test with 12 dice vs 8 dice (browsing and downloading). His chance to fail such a test are 19%. His chance to fail at least one of the tests are 35%. Edge can be used here.
Then he had to survive the scanning attempts of the IC. Depending on how many of the IC detected him at the initial test, he had to face 0-4 opposed test with 14 dice vs 8 dice. As mentioned before, the chance to fail one such a test are 13%. As tehre opposed tests are doe by the GM, the GM might as the player beforehand whether he might invest Edge to avoid detection. The GM can then use Edge in such cases.
Note, that Edge-wise it makes a huge difference whether the hacker is rolling ONE stelath test when he enters the node, which every IC has to beat, or whether he (or the GM for him) is rolling a stealth test seperately for each IC. I recommend the second version.

All in all, GMs should be careful. After the hackers Edge has run out he is very likeley to trigger an alarm, which is very bad in most hacking runs.
The rolls in this run were tailored such, that it does not get too long and different situations are explained. The chance (without Edge) for the hacker to get this run through unnoticed are under 40%.

Better figure out the probabilites beforehand (i.e. with a calculator tool like this: http://www.serbitar.de/stuff/probabilities.xls ).


Thanks to comments from:
Dashifen
Aku
Rotbart van Dainig
blakkie

Edit:
- Changed Karma for Edge
- added hot-sim, stealth specialization, changed probabilites
- added hint about data search
- deleted subscriber house rule
- added not loaded programmes
- corrected wrong attributes used in scanning tests for IC
Go to the top of the page
 
+Quote Post
Kremlin KOA
post May 8 2006, 12:06 PM
Post #2


Shooting Target
****

Group: Members
Posts: 1,590
Joined: 11-September 04
Member No.: 6,650



serb you may want to factor in that most hackers would go in HOT ASIST and that they just maybe specialized in the most important of hacking tasks in the game the entry
so an Exploit specialization would not be unlikely
Go to the top of the page
 
+Quote Post
Oracle
post May 8 2006, 12:07 PM
Post #3


Moving Target
**

Group: Members
Posts: 934
Joined: 26-August 05
From: Earth - Europe - AGS - Norddeutscher Bund - Hannover
Member No.: 7,624



Karma can be used for hacking??
Go to the top of the page
 
+Quote Post
Kremlin KOA
post May 8 2006, 12:11 PM
Post #4


Shooting Target
****

Group: Members
Posts: 1,590
Joined: 11-September 04
Member No.: 6,650



he means edge
Go to the top of the page
 
+Quote Post
Serbitar
post May 8 2006, 12:12 PM
Post #5


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



Damn, sorry, I'm still playing SR3, too . . . I'll convert that .. .
Go to the top of the page
 
+Quote Post
Serbitar
post May 8 2006, 12:22 PM
Post #6


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (Kremlin KOA @ May 8 2006, 07:06 AM)
serb you may want to factor in that most hackers would go in HOT ASIST and that they just maybe specialized in the most important of hacking tasks in the game the entry
so an Exploit specialization would not be unlikely

Thanks, very good comment. I completely forgot that.

EDIT: I let him be specialized in stealth, as this is maximizing probability in this example.
Go to the top of the page
 
+Quote Post
Kremlin KOA
post May 8 2006, 01:15 PM
Post #7


Shooting Target
****

Group: Members
Posts: 1,590
Joined: 11-September 04
Member No.: 6,650



Also how fast does the runner need the file?
If he has overnight he might as well do it the slowway, with packet sniffing
Go to the top of the page
 
+Quote Post
Serbitar
post May 8 2006, 01:31 PM
Post #8


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



Sure, but then he might have gone for admin access anyway (no reason not to), and then he wouldnt have to roll anything at all, as an admin can do anyhting. That would have made my example rather short . . .
Go to the top of the page
 
+Quote Post
blakkie
post May 8 2006, 01:55 PM
Post #9


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (Serbitar)
Sure, but then he might have gone for admin access anyway (no reason not to), and then he wouldnt have to roll anything at all, as an admin can do anyhting. That would have made my example rather short . . .


But perhaps relavent? ;)

However i certainly would challenge the idea that logged in as admin the decker can just do -anything- and that the decker wouldn't have to still avoid detection. After all they would still be in illegally.
Go to the top of the page
 
+Quote Post
Serbitar
post May 8 2006, 02:10 PM
Post #10


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



I know that you have a different opinion, but I can not model any rule set which

- lets IC analyze things
- is not totally impossible to hack
- does not need an infinite ammount of dice rolling
- gives admin and security access and advantage over normal access

with that assumption.
I would recommend sattelite nodes to prevent easy hacking. The hacker may get admin access to the sattelite, by probing, but then he has to ist there for several hours if he wants to get admin access to the second line "real" node. IC or patroling security personel (security hackers?) could wonder what even an admin is doing there for hours . . . (if they detect him)
Go to the top of the page
 
+Quote Post
Aaron
post May 8 2006, 02:15 PM
Post #11


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (Serbitar)

1.) The "subscriber" rule works for non hacking attempts only. If something is accepting input only from a certain device, this restriction can be bypassed by a simple hacking attempt. Otherwise, for example a security camera, a maglock or whatever could never be hacked directly.


You could, but I believe you'd only have access to the device itself. This is useful if you just want the device, but not at all useful if it's the node you want.

QUOTE (Serbitar again)
If it was hardwired to it's controlling node, it could not even be used as access to the local net, as it would not accept connections from your comlink.


That's why we can still get datajacks. In fact, my hacker's first run was through a building with hardwired cameras. I had to physically get into the building and then plug into and hack a camera to get access to deal with the security node. Which is the other nice thing a datajack lets you do: get access to a fully wired system.
Go to the top of the page
 
+Quote Post
blakkie
post May 8 2006, 02:26 PM
Post #12


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (Serbitar @ May 8 2006, 08:10 AM)
I know that you have a different opinion, but I can not model any rule set which

- lets IC analyze things
- is not totally impossible to hack
- does not need an infinite ammount of dice rolling
- gives admin and security access and advantage over normal access

with that assumption.

:wobble: Perhaps -you- are unable to....what? WTF are you talking about? I really think you need to go away and think about this some more. I mean "can not model any rule set which lets IC analyze things"? It is like your are a martian that just dropped out of the sky and are trying to talk about how "Bon Jovi flavoured ice cream can not possibly melt." All words in the English language, but all in all an unfathomable phrase.
Go to the top of the page
 
+Quote Post
Serbitar
post May 8 2006, 02:28 PM
Post #13


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (Aaron)
QUOTE (Serbitar)

1.) The "subscriber" rule works for non hacking attempts only. If something is accepting input only from a certain device, this restriction can be bypassed by a simple hacking attempt. Otherwise, for example a security camera, a maglock or whatever could never be hacked directly.


You could, but I believe you'd only have access to the device itself. This is useful if you just want the device, but not at all useful if it's the node you want.

You could not hack into the camera, as the camera, per RAW, would not accept input from you. You had to spoof an ID that the camera accepts input from. And when the camera was hardwried into the network, there would be no way that you could sniff any traffic to derive the desired ID.
Go to the top of the page
 
+Quote Post
blakkie
post May 8 2006, 02:36 PM
Post #14


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (Serbitar @ May 8 2006, 08:28 AM)
QUOTE (Aaron @ May 8 2006, 09:15 AM)
QUOTE (Serbitar)

1.) The "subscriber" rule works for non hacking attempts only. If something is accepting input only from a certain device, this restriction can be bypassed by a simple hacking attempt. Otherwise, for example a security camera, a maglock or whatever could never be hacked directly.


You could, but I believe you'd only have access to the device itself. This is useful if you just want the device, but not at all useful if it's the node you want.

You could not hack into the camera, as the camera, per RAW, would not accept input from you. You had to spoof an ID that the camera accepts input from. And when the camera was hardwried into the network, there would be no way that you could sniff any traffic to derive the desired ID.

:? How about hot tap the wire to the camera? Assuming the camera doesn't have a DJ port right on it. No they don't have specific details in the SR4 core book for that, but it would be a Hardware Extended Test. They cover stuff like that under, I believe, CCSS in R3.

Seriously, i think you are really out of your element here.
Go to the top of the page
 
+Quote Post
Serbitar
post May 8 2006, 02:37 PM
Post #15


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (blakkie)

:wobble: Perhaps -you- are unable to....what? WTF are you talking about? I really think you need to go away and think about this some more. I mean "can not model any rule set which lets IC analyze things"? It is like your are a martian that just dropped out of the sky and are trying to talk about how "Bon Jovi flavoured ice cream can not possibly melt." All words in the English language, but all in all an unfathomable phrase.

Ok, the slow way:

If I drop the assumption that a hacker, who has hacked in with acces rights which would allow a certain action to be performed, if it was a valid account, can not perform this action without any consequences (this is what you want) i have several problems:

- I would have to make scan roles for every IC all the time, or disallow scanning IC
- I would make hacking next to impossible, or skip allowing IC to analyze hackers or hacking actions
- I would have to roll tons of dice, because every IC in the system is constantly analyzing each action of the hacker, or disallow IC to analyze constantly
- I would have to think of some reason why somebody would want admin access, as it does not have any advantages any more

As I like to have IC that is roaming about and analyzing stuff AND I want to make hacking possible AND I dont want to roll tons of IC AND I want the admin account to mean something I have to drop the assumption that you would like to see som much.
Go to the top of the page
 
+Quote Post
blakkie
post May 8 2006, 02:54 PM
Post #16


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



Apparently your memory is quite short. :P

QUOTE (page 228)
When an intruder alert is triggered, the node will launch
an IC program and direct it to engage the intruder(s).


As i've pointed out in the other thread, IC are the -response- to detection.

EDIT:
QUOTE
As I like to have IC that is roaming about and analyzing stuff


To what end? What are you trying to accomplish with this. What is the goal?

QUOTE
I would have to think of some reason why somebody would want admin access, as it does not have any advantages any more


You just seem way out of your element here, because there are multiple possibilities. Perhaps you should phrase the thread as a question rather than an answer? Like "What are the advantages illegally entering with an admin login?" :)
Go to the top of the page
 
+Quote Post
Serbitar
post May 8 2006, 03:05 PM
Post #17


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



@blakkie

p. 222 Patrolling IC . . . (emphasis by me)

I want to have patrolling IC, because I like the idea, i ilke how it adds to the hacking experience and because it is in the rulebook.

As to tapping the camera: thats a valid thing to do, but this makes subscribing just an additional dice roll to to. Just complicating things without adding anything. I just dont like it. I stated before several times that this is my interpretation of the matrix rules.

QUOTE (Serbitar)

This is the first post in a series, where I want to present my interpretation of hacking runs.
With several posts (all int his thread) I want to cover several situations, and my interpretation of how the matrix rules can be used and balanced.


Furthermore I think you have never tried to fit all the "possibilities" that are given in RAW to a consistent picture. The problem with the RAW matrix rules is, that the hacker has no idea what to expect, because there are too many "possibilites". I want to eliminate all the possibilities that are unpractical or make hacking impossible.

Thats why I made my 3 assumptions at the start of my post. Either accept these and discuss the results, or just note that you do not want to make these assumptions (of course, then this thread is not for you) and be done with it.
Go to the top of the page
 
+Quote Post
blakkie
post May 8 2006, 03:17 PM
Post #18


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE
@blakkie

p. 222 Patrolling IC . . . (emphasise by me)


The one that starts out "Highly secure systems might employ IC..."? Well hell ya such a system is going to be hard to make a run on. Because it is -suppose- to be damn hard.

So what was the point of the roaming IC. Just to envoke a sense of danger? Or to add an element of risk? Because one or two Data Bombs are a great passive way to add risk, and a bit of good fluff narative can easily envoke any lacking sense of danger.

QUOTE
I stated before several times that this is my interpretation of the matrix rules.


As i've stated several times now, you really seem to be better positioned to ask questions. You are creating your own "problems" and then creating more issues by the "solution" to those problems. :rotfl: In short, i find your interpretation is roughly on par with that to be expected from a blind dyslexic -martian- pengiun. ;)
Go to the top of the page
 
+Quote Post
Serbitar
post May 8 2006, 03:24 PM
Post #19


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



You are neither creating problems, nor solutions. In fact you have not contributed constructively to any of the matrix threads arround.
I know your argumentation, I know your view of the situation (even before this thread. I considered it and mentioned you in the credits because of this) and I think, by now, everyone reading this thread does, too. So everybody who is sharing your view can skip this thread and label it "not appropriate" for him.

Everybody who is interested in a workable solution can read on (at least until blakkie is coming up with his own).
Go to the top of the page
 
+Quote Post
blakkie
post May 8 2006, 03:31 PM
Post #20


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (Serbitar @ May 8 2006, 09:24 AM)
In fact you have not contributed constructively to any of the matrix threads arround.

I didn't contribute constructively but i STILL got a credit? Hot damn! :eek: :wobble: :rotfl:

I went through the effort of explaining to you how far you head is jammed up between your cheeks. Then i offered explainations and links to other rather simple solutions. Plus i even spelled out some handly diceless rule of thumbs to help explain the rolls that are made, and how you can handle the benefits of using login hops without a lot of mucking around with +/- dice pools.

So what would my post need to do to earn your consideraton as a constructive one? Is nodding in agreement to your inane, failing grasp of computer systems the only way to? :love:
Go to the top of the page
 
+Quote Post
Kremlin KOA
post May 8 2006, 03:39 PM
Post #21


Shooting Target
****

Group: Members
Posts: 1,590
Joined: 11-September 04
Member No.: 6,650



Okay
Blakkie: Serbitar has a point in tat using patrolling IC would be a cost effective way to provide a second layer of defence to a host

Serbitar: Blakkie has a point in that IRL hacking is done by packet siffing or finding a OS exploit that allows root (admin) access and abusing thepriveledges given therin, therefore shadowrun modelling it such is quite realistic.

Go to the top of the page
 
+Quote Post
blakkie
post May 8 2006, 03:45 PM
Post #22


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (Kremlin KOA @ May 8 2006, 09:39 AM)
Okay
Blakkie: Serbitar has a point in tat using patrolling IC would be a cost effective way to provide a second layer of defence to a host

My point is that he is complaining about it becoming "impossible", but it is only "impossible" if he makes it so. Patroling IC that actually roll to check for intruders are intended for -hard- systems.

On moderate systems just fluff about IC happening by is enough to bring up story danager. Of course the GM needs to really sell it if he has cynical players. Or the GM can just fiat an IC dropping on the decker if the player becomes a bit blasie about all the system security icons passing by. :vegm: Just don't do it with a killer IC. Something like a trace is cool, because what it does is add a time suspense without an immediate danger.

Hell, you can describe the Firewall+System detection of a hack-in attempt as a manifestation of an IC (a system security icon). It doesn't mean you have to use the IC crunch.
Go to the top of the page
 
+Quote Post
Serbitar
post May 8 2006, 03:55 PM
Post #23


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



Then tell me how you want to manage player comlinks, where they can install as much IC as the rules allow? (Analyze 6, 3-4 Analyze 6 Agents on a 6 comlink)

Johnsons, runners and people of the same category do what is possible by the given rules.
You have to balance matrix hosts against that. As I said before, you have never tried to fit it all into a consistent picture. I have at least tried to.
Go to the top of the page
 
+Quote Post
mintcar
post May 8 2006, 04:00 PM
Post #24


Karma Police
***

Group: Dumpshocked
Posts: 1,358
Joined: 22-July 04
From: Gothenburg, SE
Member No.: 6,505



QUOTE (Serbitar)
QUOTE (blakkie @ May 8 2006, 09:26 AM)

:wobble: Perhaps -you- are unable to....what? WTF are you talking about? I really think you need to go away and think about this some more.  I mean "can not model any rule set which lets IC analyze things"? It is like your are a martian that just dropped out of the sky and are trying to talk about how "Bon Jovi flavoured ice cream can not possibly melt."  All words in the English language, but all in all an unfathomable phrase.

Ok, the slow way:

If I drop the assumption that a hacker, who has hacked in with acces rights which would allow a certain action to be performed, if it was a valid account, can not perform this action without any consequences (this is what you want) i have several problems:

- I would have to make scan roles for every IC all the time, or disallow scanning IC
- I would make hacking next to impossible, or skip allowing IC to analyze hackers or hacking actions
- I would have to roll tons of dice, because every IC in the system is constantly analyzing each action of the hacker, or disallow IC to analyze constantly
- I would have to think of some reason why somebody would want admin access, as it does not have any advantages any more

As I like to have IC that is roaming about and analyzing stuff AND I want to make hacking possible AND I dont want to roll tons of IC AND I want the admin account to mean something I have to drop the assumption that you would like to see som much.

Try to look at it the same way as you would a physical intrusion. The runners may have forged security access passes, and that sure is a big advantage, but they can't expect to run no risk what so ever of being caught. Matrix rules have been covering every possible thing that could happen in the past, making matrix runs shallow and limited like a board game. Simply accept that it's not like that anymore and that you need to take judgement yourself as a GM. You don't constantly make perception tests for guards in a building just because you're allowed to do you? Why on earth would you do something like that in the matrix then?
Go to the top of the page
 
+Quote Post
Serbitar
post May 8 2006, 04:07 PM
Post #25


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



Good points. Thats why I am restricting anlayzation rolles to illegal actions. If every action, even those covered by the hacked account, where illegal, I would have to roll much more often.
Go to the top of the page
 
+Quote Post

3 Pages V   1 2 3 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 23rd April 2024 - 06:57 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.