IPB

Welcome Guest ( Log In | Register )

2 Pages V   1 2 >  
Reply to this topicStart new topic
> Hacking for fun and profit
Panagarden
post Jun 1 2006, 01:03 AM
Post #1


Target
*

Group: Members
Posts: 1
Joined: 1-June 06
Member No.: 8,632



I have read a lot of threads on commlinks and how can and can't be done with them. There seem to be a lot of different opinions on what is possible but I haven't seen this one yet:

What stops a decent hacker from raiding every commlink he sees and stealing all the money?

It's relatively easy for a hacker with decent gear to get admin access to Joe Citizen's commlink. That commlink is his credstick. It seems very easy to steal dozens of peoples' life savings in the time it takes to finish a soykaf. Why bother doing runs when most people are walking around with an open wallet?
Go to the top of the page
 
+Quote Post
Jaid
post Jun 1 2006, 01:11 AM
Post #2


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



Orbital Bovine Bombardment?

[edit] i personally presume it's basically under the same kind of encryption as a SIN... ie, the "Don't touch me" kind of encryption that begins and ends with an arbitrary "no" from the GM. but that's just my assumption =P [/edit]

This post has been edited by Jaid: Jun 1 2006, 01:12 AM
Go to the top of the page
 
+Quote Post
CrimsonHawk
post Jun 1 2006, 01:15 AM
Post #3


Target
*

Group: Members
Posts: 31
Joined: 22-April 06
Member No.: 8,493



well from what I understand joe standard is Very poor maybe 500 new yen in a secured cred stick stuck in the com unit when he wants to buy something. now from what I understand (cred sticks are super encrypted as is the bank its tied with)


otherwise I would leave a mini drone hidden in a few known mob hang outs and collect all the com unit access codes to them and bleed them dry slowly or if I was in a hurry for some cash when a battlebowl or such came around snag that and bounce it around the world a few times to be safe but within seconds you would have a couple billion to play with :rotfl:
Go to the top of the page
 
+Quote Post
hobgoblin
post Jun 1 2006, 01:18 AM
Post #4


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



hmm, didnt this come up in a old matrix2.0 thread? (just before or after SR4 was released)

think of it as a single murder vs a series of murders with matching MO.

the first will have the cops more or less searching blind if the victim was picked at random of the street. ie, there is nothing to tie the murderer to the victim.

but with a serial murder case there will be similaritys. similar shoeprints arond there area. maybe similar biological material (basicly zeroing it down to a single person more or less). and the list adds up.

now do the same comparison with your question. a single virtual wallet emptyed and it could have been done by any number of the comlink id's in the logs. and if the hacker is smart/carefull he will be erasing logs as he goes.

but if there is hundreds of them happening within a small area then they can compare data and zero in on a single comlink id and so on.

its the same thing with a credit card fraud. the stupid ones charge a single, expensive item to the victims card (often said item is allso hard to transport, making them even more stupid). the smart ones however charge up many small ones that will not make you stop and wonder when you see the bill. maybe some low amount cash withdrawls, maybe some food or other every-day items. just make sure not not overextend a card and people will not notice.

less money then avarage on their account at the end of the month, could be any number of reasons. zero money the day after the paycheck and they will notice, even with a shared account and a teenager in the household :P
Go to the top of the page
 
+Quote Post
Nasrudith
post Jun 1 2006, 03:16 AM
Post #5


Moving Target
**

Group: Members
Posts: 106
Joined: 10-April 06
Member No.: 8,447



Simple, most people will keep their money in the bank and wire it over when needed and game balance returrns. .
Go to the top of the page
 
+Quote Post
Crusher Bob
post Jun 1 2006, 07:59 AM
Post #6


Runner
******

Group: Members
Posts: 2,598
Joined: 15-March 03
From: Hong Kong
Member No.: 4,253



But then, there has to be a secure method of transmitting they payment orders to the financial institutions. So, the hacker is not 'empying your account' in a kind of emptying the cash box type smash and grab, but instead, hacking into your commlink, waiting for you to purchase a hotdog (or whatever) and sniffing your bank passwords. Then using your passwords to buy whatever it is he wants. Admittedly, the electronic paper trail left by these transactions will give you plenty of routes of investigation, but the fact that basically any Tom, Dick, or Harry can do this means that it will happen so often that the investigators will not have the manpower (or processor cycles) to look into every case.

Too many game systems don't allow secure encryption but fail to think of all the repercussions of this.
Go to the top of the page
 
+Quote Post
Serbitar
post Jun 1 2006, 08:19 AM
Post #7


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (Panagarden @ May 31 2006, 08:03 PM)
I have read a lot of threads on commlinks and how can and can't be done with them.  There seem to be a lot of different opinions on what is possible but I haven't seen this one yet:

What stops a decent hacker from raiding every commlink he sees and stealing all the money?

It's relatively easy for a hacker with decent gear to get admin access to Joe Citizen's commlink.  That commlink is his credstick.  It seems very easy to steal dozens of peoples' life savings in the time it takes to finish a soykaf.  Why bother doing runs when most people are walking around with an open wallet?

You can steal only, what you are able to get without any Authentification at all. For everything that is above 20 Nuyen, the user of the comlink will have to enter a PIN Code, use a fignerprint or voice/retina scan.

If you want to curcemvent this, you would have to hack into the bank nodes.
Go to the top of the page
 
+Quote Post
FanGirl
post Jun 1 2006, 08:23 AM
Post #8


Moving Target
**

Group: Members
Posts: 684
Joined: 8-April 06
From: My dorm room
Member No.: 8,438



A quick question: where does this "20 Nuyen limit" thing come from?
Go to the top of the page
 
+Quote Post
Crusher Bob
post Jun 1 2006, 08:39 AM
Post #9


Runner
******

Group: Members
Posts: 2,598
Joined: 15-March 03
From: Hong Kong
Member No.: 4,253



QUOTE (Serbitar)
You can steal only, what you are able to get without any Authentification at all. For everything that is above 20 Nuyen, the user of the comlink will have to enter a PIN Code, use a fignerprint or voice/retina scan.


And then that PIN code is transmitted to the bank for verification. You hack the subjects comlink and then sniff thier PIN code, or you hack the store's commlink and sniff the customers PIN code.
Go to the top of the page
 
+Quote Post
Serbitar
post Jun 1 2006, 09:55 AM
Post #10


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (FanGirl)
A quick question: where does this "20 Nuyen limit" thing come from?

My imagination.
Go to the top of the page
 
+Quote Post
Serbitar
post Jun 1 2006, 09:58 AM
Post #11


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (Crusher Bob)
QUOTE (Serbitar @ Jun 1 2006, 04:19 PM)
You can steal only, what you are able to get without any Authentification at all. For everything that is above 20 Nuyen, the user of the comlink will have to enter a PIN Code, use  a fignerprint or voice/retina scan.


And then that PIN code is transmitted to the bank for verification. You hack the subjects comlink and then sniff thier PIN code, or you hack the store's commlink and sniff the customers PIN code.

Should be doable.
The question is: How do you transfer the money to your bank account without it leaving a data trail. Once the victim finds out his money is gone he will complain at the bnak and they will backtrace everything.
Deleting the trail should involve some major hacking.
Go to the top of the page
 
+Quote Post
Edward
post Jun 1 2006, 02:46 PM
Post #12


Neophyte Runner
*****

Group: Members
Posts: 2,073
Joined: 23-August 04
Member No.: 6,587



On how you transfer the money to your bank account. You don’t, you transfer it to a account in the name of a good throwaway fake sin. Then you walk into gold mark and buy some heavy bling, bling, 24 carrot gold necklaces only an hour after you stole all the money. Then you trash the sin and sell the gold to a fence that is assuming you stole it (and thus treats in accordingly) you probably loose 50% of your money to the fence, nano-paste disguise and ID but its worth it for security.

Indecently while you where doing the theft your comlink was set up as for the person with that account and was sitting with your meet in suburb of Denver (also where your gold shop is) while you where stealing from people in London befor you sell the gold to a fence on the other side of Denver and take your hard currency back to Seattle to spend.

Go to the top of the page
 
+Quote Post
Aaron
post Jun 1 2006, 03:00 PM
Post #13


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



Simple enough:

QUOTE (SR4 p. 215-216)

Linked Passcodes requires an extra bit of input from the user—an extra level of identification specific to a person or a device. Th is can be a scan from a security scanner (retinal, fingerprint, palmprint, and so on) linked to the commlink/terminal or the correct signature from the device’s OS or a unique RFID tag. If the scan or signature doesn’t match the records, access will be denied.

Passkeys are one of the most secure ways of controlling access to a node. Passkeys are unique encrypted modules that plug into a commlink or terminal. Many corporations require this accessory for telecommuting workers. When a logon is attempted, the node queries the module; if it doesn’t receive the proper code, the user is denied access.


Go to the top of the page
 
+Quote Post
Geekkake
post Jun 1 2006, 03:42 PM
Post #14


Moving Target
**

Group: Members
Posts: 475
Joined: 13-March 06
From: dusty Mexican borderlands
Member No.: 8,372



My understanding of how a commlink functions with financial transactions is as follows:

Your commlink doesn't carry your money. It's not a credstick. Your money is in your bank account, behind bank security. You can't just "take" that money. But you can defraud. Let me give you a real world example:

You wanna buy something on the International Cyber Webnet. Your money is in your bank account. You have your PC, you have your debit card. You order the item, and enter the information on your debit card into your PC (on the vendor website) and submit it to the vendor. The vendor's merchant account provider takes the funds out of your bank account and places it into the vendor's (usually with a cut for themselves - legit business isn't so different from the shadows). Then, you (presumably) get your stuff.

At no time during that transaction was your money "present" in your debit card or PC. The only real financial transactions were between the vendor, their merchant services, and your bank. You can, however, steal the debit card information and defraud the account with fraudulent purchases as per previous posts.

Replace "PC" with commlink, "Internet" with "Matrix", and "debit" with "whatever database software holds your banking information on your commlink", and you have how to works in 2070.

If you absolutely must make a large purchase with fraudulent funds, I recommend doing so with a competent black market contact with an offshore account in a country with liberal banking and taxation laws, such as the Caribbean League.
Go to the top of the page
 
+Quote Post
Edward
post Jun 1 2006, 06:29 PM
Post #15


Neophyte Runner
*****

Group: Members
Posts: 2,073
Joined: 23-August 04
Member No.: 6,587



That is pretty much how I saw things now you can sniff somebody’s comlink until they make a purchase and get all that information, including the transmitted data coming from there biometric scanner.

And considering the power of the matrix to track money I would not trust the security of a bank in a country like the Caribbean league or a black marked contact, these people are for sail and could possibly be hacked.

All transfer between my short term bank account that is obviously taking stolen money (and will be shut down in a day) and my usual accounts should be conducted in the form of high value, untraceable and portable commodities. Gold, platinum, precious stones.

Edward
Go to the top of the page
 
+Quote Post
hobgoblin
post Jun 1 2006, 06:42 PM
Post #16


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



i would expect that the only datatraffic from the targets comlink when paying for goods is a account number. this is transmitted to a special terminal that have a set of biometric scanners and a encrypted link to the bank.

when paying you transmitt your account data, and scan your biometrics at the terminal. the terminal collects both and transmitt it to the bank. the bank check it against the data it have in the database. if ok, then it starts the money transfer to the shops bank. when transfer is completed and verified, the customer is mailed a receipt for whatever goods he bought...
Go to the top of the page
 
+Quote Post
Geekkake
post Jun 1 2006, 07:08 PM
Post #17


Moving Target
**

Group: Members
Posts: 475
Joined: 13-March 06
From: dusty Mexican borderlands
Member No.: 8,372



QUOTE (hobgoblin)
i would expect that the only datatraffic from the targets comlink when paying for goods is a account number. this is transmitted to a special terminal that have a set of biometric scanners and a encrypted link to the bank.

when paying you transmitt your account data, and scan your biometrics at the terminal. the terminal collects both and transmitt it to the bank. the bank check it against the data it have in the database. if ok, then it starts the money transfer to the shops bank. when transfer is completed and verified, the customer is mailed a receipt for whatever goods he bought...

You're right. But we're talking commlink purchases, here. Which, by their nature, must transmit biometric information, if necessary.
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post Jun 1 2006, 07:22 PM
Post #18


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



QUOTE (Panagarden)
I have read a lot of threads on commlinks and how can and can't be done with them. There seem to be a lot of different opinions on what is possible but I haven't seen this one yet:

What stops a decent hacker from raiding every commlink he sees and stealing all the money?

It's relatively easy for a hacker with decent gear to get admin access to Joe Citizen's commlink. That commlink is his credstick. It seems very easy to steal dozens of peoples' life savings in the time it takes to finish a soykaf. Why bother doing runs when most people are walking around with an open wallet?

This reminds me of AD&D, "Why don't we just kill the shop keeper and take all his gear?"

My short answer is, it's not why my group plays Shadowrun. We want to have adventures and earn our keep (honestly?).

Game wise, nothing is stopping you really. You'd need to know how the Commlink interacts with other systems to tender payments. Just like a current-day credit or ATM debit card transaction, but more sophisticated in 2070.

A general overview: You provide some payment source (Account # and Fund source), the vendor requires some authentication (probably a passkey module, thumbprint, etc.) and the funds are transferred from once account to the other. Like current methods of "cashless payment" PIN#'s or Billing Zip codes are used for authentication for remote payments.

I doubt spoofing alone woiuld work unless you could produce authentication and I doubt AccessID alone cuts it in 2070 since that would be *really* hackable. Best you could do without authentication is get the bank to freeze someones account with a shit-load of rejected authentication hits.

Breaking the encrpytion to get his Account or Personal information would be one part, that's Identity Theft, but actually using it is another matter entirely.
Go to the top of the page
 
+Quote Post
vipox
post Jun 1 2006, 07:33 PM
Post #19


Target
*

Group: Members
Posts: 16
Joined: 2-November 05
From: New York
Member No.: 7,920



When someone transfers important data such as a password over an encrypted link, what is transmitted is a one time hash, which with timestamps and other random data included to stop replay and man in the middle attacks, even if the line encryption is broken what you get is a hash and that hash can only be used once, so having it means nothing.

This stops normal sniffer attacks, but if you break into the sending comlink and then record the password given at the source, but this is ideally stoped buy using a challage response password system, with multiple questions / responses. So that the password if recorded can only be used if the exact same challage is given. Given that banks with most likely "run" anti recorder agents on your comlink while you are doing all this.

So I really don't think that it is all that possible.

but anyway I will stop ranting now.
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post Jun 1 2006, 08:25 PM
Post #20


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



QUOTE (vipox)
When someone transfers important data such as a password over an encrypted link, what is transmitted is a one time hash, which with timestamps and other random data included to stop replay and man in the middle attacks, even if the line encryption is broken what you get is a hash and that hash can only be used once, so having it means nothing.

This stops normal sniffer attacks, but if you break into the sending comlink and then record the password given at the source, but this is ideally stoped buy using a challage response password system, with multiple questions / responses. So that the password if recorded can only be used if the exact same challage is given. Given that banks with most likely "run" anti recorder agents on your comlink while you are doing all this.

So I really don't think that it is all that possible.

but anyway I will stop ranting now.

This is what the Passkey module effectively does, it's required to authenticate and plugs into a commlink (per SR4). You can't be authenticated without it, however, if you can make a copy, you're in biz at least till it's reported stolen or fradulent activity is reported.
Go to the top of the page
 
+Quote Post
Tarantula
post Jun 1 2006, 08:43 PM
Post #21


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



At that point though, why not just knock the guy out in his apartment, and steal his commlink, and use it to buy stuff completely legitimately before he wakes up. Since you'd need to have had access to the passkey at least once to copy it.
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post Jun 1 2006, 08:50 PM
Post #22


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



QUOTE (Tarantula)
At that point though, why not just knock the guy out in his apartment, and steal his commlink, and use it to buy stuff completely legitimately before he wakes up. Since you'd need to have had access to the passkey at least once to copy it.

Robbery 101!! :rotfl:
Go to the top of the page
 
+Quote Post
Shrike30
post Jun 1 2006, 09:37 PM
Post #23


Runner
******

Group: Members
Posts: 2,556
Joined: 26-February 02
From: Seattle
Member No.: 98



More like Robbery 1 :P
Go to the top of the page
 
+Quote Post
hobgoblin
post Jun 1 2006, 11:10 PM
Post #24


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



nothing like breaking in, having your troll buddy sit on the victim, and order pizza and similar on his comlink ;)
Go to the top of the page
 
+Quote Post
Edward
post Jun 2 2006, 07:05 AM
Post #25


Neophyte Runner
*****

Group: Members
Posts: 2,073
Joined: 23-August 04
Member No.: 6,587



“i would expect that the only datatraffic from the targets comlink when paying for goods is a account number. this is transmitted to a special terminal that have a set of biometric scanners and a encrypted link to the bank.”

Remember, you can have your own biometric scanner. All you have to do is reprogram your biometric scanner to deliver from a file instead of scanning and hack the stores biometric scanner (or sniff it’s output and break the encryption, a 30 second job given the encryption rules)


GrinderTheTroll points out that it’s a boring game if you do this all the time. There are 2 problems. First what are you going to do about that annoying question “why do you run the shadows” when you can so much more easily and safely live on theft, and even if you’re a thrill seeker why don’t you do this for a week and then have all the gear you could possibly want, or at least hold it in reserve for if you get into money trouble.

This is in the same basket as stealing cars for chop shops, it doesn’t make for a fun game but you need to recognize its something the characters can do. And have no conservable reason not to do if you back them up against the wall money wise.

Edward
Go to the top of the page
 
+Quote Post

2 Pages V   1 2 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 19th April 2024 - 06:16 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.