IPB

Welcome Guest ( Log In | Register )

3 Pages V  < 1 2 3 >  
Reply to this topicStart new topic
> Hacking my way
blakkie
post May 8 2006, 06:06 PM
Post #31


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (Serbitar)
QUOTE (mdynna @ May 8 2006, 11:36 AM)
Also remember that you as the GM decide what is "illegal" for an Admin account and what is "legal."

Per definition an admin account can do anything.

They have "total access", which is entirely different than what you seem to be meaning by "do anything" and certainly does not preclude the helpful (one might almost say constructive, if you were actually looking for constructive) tips mdynna has given.
Go to the top of the page
 
+Quote Post
blakkie
post May 8 2006, 06:11 PM
Post #32


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (Serbitar)
@blakkie:

I think you are now solving your homemade problems . . .
System and Firewall have no availability at all
Response has 16
A 6 Agent has 18

:rotfl:

Actually in the core book an Agent 6 doesn't even exist (check at the back in the gear section).


BTB Response 5 has Avail 12 (chargen legal), and yes Response 6 is 16. But not 16R or 16F. Or higher.
Go to the top of the page
 
+Quote Post
Serbitar
post May 8 2006, 06:14 PM
Post #33


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



Negative:
The system does not question admin actions. The system can only verify that it is an admin. The system can not find out whether an action is appropriate for the overall situation or not. Thats why any actions performed by an admin will never be hacking actions.

If you hack yourseelf root access, you are root. The system never questions root. It only verifies that you are really root.
Go to the top of the page
 
+Quote Post
Serbitar
post May 8 2006, 06:18 PM
Post #34


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (blakkie)
Actually in the core book an Agent 6 doesn't even exist (check at the back in the gear section).

page ? paragraph ?
Go to the top of the page
 
+Quote Post
blakkie
post May 8 2006, 09:37 PM
Post #35


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (Serbitar @ May 8 2006, 12:18 PM)
QUOTE (blakkie @ May 8 2006, 01:11 PM)
Actually in the core book an Agent 6 doesn't even exist (check at the back in the gear section).

page ? paragraph ?

Oops, sorry about that. That was only Autosofts that have that wierd cap that doesn't show up on page 228. But I wasn't refering Agents anyway, I know they have a higher Avail, 18 isn't too bad. It is just the hacking programs that have the low ratings....but like i said getting the hardware down is the real key.

Not that, now that you mention it, the higher Agents wouldn't also fall into that power range that would require licensing. It seems rather odd that something that cheap (only 15K) and suppositly realtively easily copied (although arguably an Agent could be built to actively fight against pirating attempts) and legal would rank so high on the Avail.

QUOTE
Negative:
The system does not question admin actions.


Er, actually mdynna was spot on. For big iron at least at one time. I know because a person in my class many years ago, innocently, managed on a PDP-11 we were on to pass a system type command on to the OS to execute within it's own thread. It didn't really do anything harmful, however half a day later a very concerned IT department security manager showed up wanted to know wtf the student had done. How did he know something happened? Because he had initiated a policy of personally monitoring the log of the system level commands for anomolies. It was still a system process that had done this command, but the usage for it was outside the norm.

Move forward 80+ years and instead of a flesh and blood IT security manager you have a backroom system process monitoring the command logs looking for suspicious activity.

Watchers watching the watchers.
Go to the top of the page
 
+Quote Post
Serbitar
post May 8 2006, 11:46 PM
Post #36


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



So to sum things up:

Comlink all 6
6 Analyze
3 Agents 6
Encryption 6

is a thing which most likely every Runner worth his salt will have, given the cost and availabilities in the book. Nothing of these is even restricted, you can walk into a shop and just buy it. Thus any matrix rules, or interpretation of the rules, must cope with this fact and take it as a quasi baseline.

As to monitoring system logs: It is right there in my example. It has been there from the start.
Go to the top of the page
 
+Quote Post
Divine Virus
post May 9 2006, 12:02 AM
Post #37


Moving Target
**

Group: Members
Posts: 801
Joined: 13-March 06
Member No.: 8,374



umm.... isn't hacking on the fly 1 IP not, 1 turn?
Go to the top of the page
 
+Quote Post
hobgoblin
post May 9 2006, 12:43 AM
Post #38


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



one small thing about admin accounts. in windows today you can remove the default admin accounts access to anything if so wanted. basicly is just another account, but as default it have higher access then the rest of them.

therefor its possible that even with a admin account you can run into files and other objects that you have no legal access to. now there are some safeguards buildt in, like say a admin can take ownership of something. but he cant give it back, so it will be noticed if its not supposed to be done unless asked for or orderd.

hell, there is a "crasy" security system being put into use for linux, developed by the NSA. its called SElinux. and with that, even if i log in as root i may not have all the powers one would normaly expect. i dont fully understand its full range of abilitys myself, but it seems one can vary the access rights based on if the root account is accessed localy or remotly, among other things.

so in many cases there would still be things one could not do, even with a admin account, when logged in remotely.

hmm, now that i think about it there was a story in a book i read, or maybe a web article, where the only way to gain full unrestricted admin access from a terminal was by having that terminal connected on the correct port on the network.

now the makers of this system was showing it of at some industry gathering, and was offering a money price if anyone could crack it, so sure of its safety they was.

but someone did in the and crack it. by waiting for the techies to walk away for a coffe break, leaving some sales zombie there. then one person distracted that zombie, while another picked the lock of the networking locker, flipped some wires over, created a secondary admin account or something like that, flipped the wires back, relocked the locker and waited for the techs to return. then he walked up to a terminal, enterd into the admin account and called the techs over so they could see ;) end of the day he walked out of there with the cash.

as the name of the person? kevin mitnick ;)
Go to the top of the page
 
+Quote Post
Serbitar
post May 9 2006, 01:22 PM
Post #39


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



@Virus
I will check that

@hobgoblin

sure, there may be the ocasional account called "admin" or "root" that can not do anything in some system. But there is allways an account, that can do anything. Just call this one admin, and the rest security.

After all its just a matter of naming. For sake of simplicity, at least.
Go to the top of the page
 
+Quote Post
blakkie
post May 9 2006, 02:27 PM
Post #40


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (Serbitar @ May 9 2006, 07:22 AM)
@hobgoblin

sure, there may be the ocasional account called "admin" or "root" that can not do anything in some system. But there is allways an account, that can do anything. Just call this one admin, and the rest security.

After all its just a matter of naming. For sake of simplicity, at least.

You stunned wombat.

The point is that on systems with the power to back it up there are watchers watching the watchers. Ultimately the system itself sits above any and all accounts. The accounts can influence the system to varying degrees, but those are all in fact just requests not actual actions performed directly by the account. Requests that can all be checked and monitered....and a number will be, and there are indeed limits put in place. Sometimes the 'hack' is just to avoid detection and raising an alert, sometimes it is to actually be able to have the action occur at all. With the higher level accounts more the former than the later.
Go to the top of the page
 
+Quote Post
Serbitar
post May 9 2006, 04:54 PM
Post #41


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



Those are extreme exceptions. They do not have to be covered by rules, as long as they stay just that, exceptions.
Go to the top of the page
 
+Quote Post
Kremlin KOA
post May 9 2006, 05:19 PM
Post #42


Shooting Target
****

Group: Members
Posts: 1,590
Joined: 11-September 04
Member No.: 6,650



Blakkie That does notin any way model Real Life computing systems

Now considering that the SR4 wireless change was supposed to add realism

The closest I have seen to a system with admin being limited was quite simply one where nousernames were assigned to the Root

You could still hack root access withan exploit

At the last Ruxcon (big Hacker convention in Sydney Australia) the winning time for a particular hack contest for such a system was 12 seconds
Go to the top of the page
 
+Quote Post
blakkie
post May 9 2006, 05:59 PM
Post #43


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (Kremlin KOA @ May 9 2006, 11:19 AM)
Blakkie That does notin any way model Real Life computing systems

My experience in writing Windows NT drivers say otherwise. Intel Ring 0 code is run by the system itself, and only the system. You cannot execute it from the context of an account. The administrator can still get the system to execute given code, but you have to do it by altering the OS itself. Each new version of NT makes manual alteration of the OS drivers more difficult. In effect you have to 'hack' into place a replacement driver.

This all on a POS desktop machine.
Go to the top of the page
 
+Quote Post
Kremlin KOA
post May 9 2006, 06:26 PM
Post #44


Shooting Target
****

Group: Members
Posts: 1,590
Joined: 11-September 04
Member No.: 6,650



there is a reason why NT is not normally used for large networks

besides which with NT all the major hacking (SR) actions can be done on an account with full priveledges

even crash (BSoD) although on NT it might take a hacking action

UNIX and LINUX systems, which are more secure, do allow root to access the kernel

oh and IRL NT does have a level of account which can access the kernel, it is just only supposed to be available to microsoft personnel
Go to the top of the page
 
+Quote Post
James McMurray
post May 9 2006, 06:30 PM
Post #45


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



NT has been used in every large network I've encountered including two colleges, a 1500 employee (~1200 workstations) company, and a 110,000 employee company (with who knows how many workstations).

In the classified lab I worked in NT was used for some stuff and linux was used for others. The choice was made based on programmer's personal preference and software of choice.
Go to the top of the page
 
+Quote Post
Kremlin KOA
post May 9 2006, 06:32 PM
Post #46


Shooting Target
****

Group: Members
Posts: 1,590
Joined: 11-September 04
Member No.: 6,650



interesting
was going on US and Aus national statistics
most of the large networks in te US are UNIX or Linux(I think 75% or so between them circa '99)
the rest are wither MACos (rare as hen teeth) or NT
Go to the top of the page
 
+Quote Post
James McMurray
post May 9 2006, 06:34 PM
Post #47


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



I can only speak from personal experience, not having worked in 75% of the companies in america and Australia. I'd be interested in seeing a source for that statistic, given how easily manipulated statistics can be. You'd probably get different numbers if you talked to Microsoft then you would if you queried a BBS populated by *NIX gurus.
Go to the top of the page
 
+Quote Post
Kremlin KOA
post May 9 2006, 06:40 PM
Post #48


Shooting Target
****

Group: Members
Posts: 1,590
Joined: 11-September 04
Member No.: 6,650



the aussie ones were supposed to be Australian Bureau... not sure if the US ones were as reliable.

It makes sense, as it is only a recent development for networ hub machines to be PCs as opposed to dedicated unix servers
Go to the top of the page
 
+Quote Post
James McMurray
post May 9 2006, 06:55 PM
Post #49


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



Those are also 1999 statistics, which mean next to nothing now. I'm not saying it's wrong, just that tossing out a 7 year old number from partially unknown sources is far from being evidential.
Go to the top of the page
 
+Quote Post
Kremlin KOA
post May 9 2006, 06:59 PM
Post #50


Shooting Target
****

Group: Members
Posts: 1,590
Joined: 11-September 04
Member No.: 6,650



evidential it is
Absolue proof it is not
(sorry , the distinction between those is a pet peeve)

my major point was that the standard 'admin' account in NT is not what SR is calling 'admin' that is more like a security account
Go to the top of the page
 
+Quote Post
James McMurray
post May 9 2006, 07:09 PM
Post #51


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



Ok, I suppose you could call it evidence. It's possible that it is false evidence, and it's definitely out dated evidence. But if you want to be technical, then the guy I pay $5 to so he'll say I was with him playing video games all night instead of out robbing liquor stores also constitutes evidence. :)
Go to the top of the page
 
+Quote Post
blakkie
post May 9 2006, 07:38 PM
Post #52


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (Kremlin KOA @ May 9 2006, 12:26 PM)
besides which with NT all the major hacking (SR) actions can be done on an account with full priveledges

...with observance from the system. Anything of import really, because once again all the I/O goes through the OS. It is a function of the "micro"kernel architecture.

QUOTE
even crash (BSoD) although on NT it might take a hacking action


Most definately for BSoD, because the system catches it otherwise. A BSoD is ultimately caused by a driver programmer screwing up and not making the driver bulletproof.

QUOTE
oh and IRL NT does have a level of account which can access the kernel, it is just only supposed to be available to microsoft personnel


I'm not sure you have that exactly straight. Are you talking about the Local System account, because that is something a little different. It still passes stuff through the system. It is really similar to Administrator from a security POV, and in some ways more limited because of lack of access to the desktop and user input.

I think you misunderstand me here. I'm not talking about an account per say. I'm talking about the system itself. Sure the root account can recompile parts of the kernel and load them in. But those actions themselves are still going through the kernel to be able to do that since your basic IO, the actual communication with the hardware, is done through the kernel. Right?
Go to the top of the page
 
+Quote Post
Serbitar
post May 15 2006, 12:52 PM
Post #53


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



After some thought I decided to skip my "no subscrpition" interpretation of the rules, for compatability. The subscription rule can always be bypassed by simply sniffing the traffic to a node and then spoofing the ID. This does simply add just another two dice rolls to any decent security network, but what the heck . . .
In my next text I will give an example of how to prevent unlimited "network relaying" for infinite security.
Go to the top of the page
 
+Quote Post
Serbitar
post May 15 2006, 06:49 PM
Post #54


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



Comments: Assumptions 1-2 from my previous examples still apply.


TODAY: Hacking through a relay of linked nodes

It was discussed a couple of times: What can be done against a network where several nodes are linked, using the subscriber rule, together to prevent, or delay, hacking.
A very good example would be this:

A runners has a main comlink A, he uses for normal communication, and 5 "relay" comlinks B,C,D,E,F. Only comlink F has wireless capability.
The runner uses his main comlink to communicate, comlink B only accepts input from A and C, comlink C only accepts input from B and D and so forth:

A - B - C - D - E - F - WiFi-World

To get to A, a hacker has to hack B,C,D,E, and F first.
But then, in SR4, everything has a device rating. Even our clothes are nodes, as they have built in climate control and such. They might only have a device rating of 1, but they would also have to be hacked. So the runner could do the following:

A - B - C - D - E - cyberleg - smartgun - trousers - jacket - glasses - F - WiFi-World

This is perfectly acceptable under standard SR4 rules, and the first example isnt even unlogical, but a very sensible thing to do.
So what to do about this? Just let hackers go through everything?

I propose a rules interpretation that circumvents possible dice orgies, is fast and understandable:

A by using Spoof a hacker can disguise as a data packet and exploit a node to relay him to his destination. He needs the network ID of the host he wants to be relayed to. If he wants to also spoof the ID he originated from, he can do so in a separate test.
Every host, that the hacker is being relayed to, may roll against the spoof test with System+Firewall If the hacker has at least 1 net success, he is relayed to the next host in the chain, or he may chose to hack into the node that is relaying him using normal "hacking on the fly" procedures. In both cases he may choose to analyze the node to get information about the system ratings only. If he does not have any net successes, he may decide to immediately hack the node in question using standard "hacking in on the fly" procedures, use legit access rights to access the node, or be catapulted back to the node he started the spoof attempt from. When he is relayed to his destination, he may hack into the node on the fly, or access it with legit user rights.
Note that if the relay host, scores any net hits in the opposed test, it has detected that something is wrong and may launch security measures.

(H) Hacker:
Hacking: 5 (specialization stealth)
Computer: 5

Hot-SIM: +2 dice

Firewall: 5
Response: 5
Firewall: 5
Signal: 5

Loaded programmes:

- Exploit 5
- Analyze 5
- Spoof 5
- Sniffer 5


(C1) Comlink 1:
Firewall: 6
System: 6
Signal: -
Response: 6

(C2) Comlink 2:
Firewall: 1
System: 1
Signal: -
Response: 1

(C3) Comlink 3:
Firewall: 3
System: 3
Signal: -
Response: 5

(C4) Comlink 4:
Firewall: 6
System: 6
Signal: 6
Response: 6


Network architecture:

C1 - C2 - C3 - C4 - WiFi-World


Steps:
(bold steps denote the minimal version of this example)

(H) Sniffing Traffic
(H)Matrix Perception
(H) Spoofing relay
(C4) Detecting relay spoof
(H) Analyze action
(C3) Detecting relay spoof
(H) Analyze action
(C2) Detecting relay spoof
(H) Analyze action

Explained:

(H) Sniffing Traffic
Hacking+Sniffer: 5+5+2 = 3

The hacker wants to hack into Johnsons comlink. He knows Johnson is extremely paranoid and might have several layers of relay comlinks. He phones the Johnson to give a status report. As he does not want to hack into the MSPs database to get the node ID that is correlated to the Johnsons phone number, he is simply monitoring the traffic going from the MSP to the Johnson. To interfect the traffic he has to succeed in a Hacking+Sniffer test. With 3 hits, he easily intercepts the traffic.
Note: If the traffic was encrypted it had to be decrypted first.

(H)Matrix Perception
Computer+Analyze: 5+5+2 = 2

To get the ID out of the traffic, the hacker has to succeed in a simple matrix perception test.


(H) Spoofing relay
Hacking+Spoof: 5+5+2 = 5 hits

Now, the hacker wants to hide as a communications data package. He spoofs the ID of such a package and virtually knocks on the door of the Johnsons gateway host C4.


(C4) Detecting relay spoof
System+Firewall: 6+6 = 4 hits

The C4 chokepoint comlink scans the traffic for validity before relaying it. It achieves 4 hits in its test, which leaves the hacker with 1 net success. The node automatically relays the "hacker package" down the subscriber line.


(H) Analyze action
Hacking+Analyze: 5+5+2 = 2 hits

The hacker wants to know what node he is being relayed through. He rolls only 2 hits and goes for System and Firewall attributes. The GM tells him that both are 6. With a "holy shit" on his virtual lips the hacker is relayed to the next node.


(C3) Detecting relay spoof
System+Firewall: 3+3 = 3 hits

The C3 relayhost comlink scans the traffic for validity before relaying it. It achieves 3 hits in its test, which leaves the hacker with 2 net success. The node automatically relays the "hacker package" down the subscriber line.


(H) Analyze action
Hacking+Analyze: 5+5+2 = 3 hits

The hacker wants to know what node he is being relayed through. He rolls 3 hits and goes for System, Firewall and Response attributes. The GM tells him the ratings. The hacker is mumbling "getting better" while he is relayed to the next node.


(C2) Detecting relay spoof
System+Firewall: 1+1 = 1 hit

The C2 relayhost comlink scans the traffic for validity before relaying it. It achieves 3 hits in its test, which leaves the hacker with 2 net success. The node automatically relays the "hacker package" down the subscriber line to C1.


(H) Analyze action
Hacking+Analyze: 5+5+2 = 3 hits

The hacker wants to know what node he is being relayed through. He rolls 3 hits and goes for System, Firewall and Response attributes. The GM tells him the ratings, which are 1,1,5. The hacker thinks "big mistake" and notes the ID of this node. He might hack in here later to get some admin privileges and install a backdoor right in the Johnsons subscriber line.

The hacker is then relayed to the final C1 comlink, where he may try to hack in, with an Hacking+Exploit (6, 1 Phase) extended test.But his best choice is to do the whole procedure again and hack, the weak C2 comlink, get some admin privileges and then sit there and probe the hell out of the heavily fortified C1 comlink to avoid detection in his exploit attempt.
Go to the top of the page
 
+Quote Post
Loestal
post May 19 2006, 02:11 AM
Post #55


Target
*

Group: Members
Posts: 17
Joined: 16-May 06
Member No.: 8,565



Forgive me for not reading every page...but I can't seem to find how clean out your net hits from a system before logging off so you don't leave a data trail. I looked in the book, and perhaps I'm just passing it by but I can't seem to find how to do it..so could somebody please tell me or direct me to a page number so that I can figure this out.
Go to the top of the page
 
+Quote Post

3 Pages V  < 1 2 3 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 2nd September 2025 - 10:29 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.