SGM Preview, Serbitar's guide to the matrix |
SGM Preview, Serbitar's guide to the matrix |
Jun 6 2006, 12:03 PM
Post
#1
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
Just a small "work in progress" preview of my matrix compilation .
Im trying to get the SR4 matrix rules into a consistent picture and provide some stuff until Unwired is out. Lots of interpretation included, should be consistent with SR4 base rules. Feedback is appreciated. |
|
|
Jun 6 2006, 01:08 PM
Post
#2
|
|
Moving Target Group: Members Posts: 158 Joined: 10-April 06 Member No.: 8,448 |
Apparently I am not the only one creating the same topic on multiple boards... hehe.
You should definately catch a look; Serbitar has a very detailed, practical hacking example and brings useful houserules along. |
|
|
Jun 6 2006, 03:15 PM
Post
#3
|
|
Target Group: Members Posts: 26 Joined: 17-May 06 Member No.: 8,568 |
Im looking over it and I have a question:
In it it says that a hacker to hack in only needs to roll to beat the nodes Firewall (plus whatever account bonus). Isn't is supposed to be Firewall+System(+Account bonus)? |
|
|
Jun 6 2006, 03:25 PM
Post
#4
|
|
Moving Target Group: Members Posts: 158 Joined: 10-April 06 Member No.: 8,448 |
No, just firewall. Would be rediculous otherwise. System+Firewall from Serbitar's example-middleclass-house would have a treshold of six to hack it on the fly, so even the world's best hacker with the best programs would not be able to reliably hack it. On the fly.
|
|
|
Jun 6 2006, 03:34 PM
Post
#5
|
|
Target Group: Members Posts: 26 Joined: 17-May 06 Member No.: 8,568 |
In this thread: http://forums.dumpshock.com/index.php?show...topic=13193&hl=
We talk about it. No one seemed to notice. I'm fairly sure in the book it's firewall and system. I dont have the book on hand but I'm REALLY sure thats right. Plus as noted in the mentioned thread, a starting hacker can get upwards of 17 dice to roll vs the node to hack. |
|
|
Jun 6 2006, 03:47 PM
Post
#6
|
|
Moving Target Group: Members Posts: 158 Joined: 10-April 06 Member No.: 8,448 |
Yeah, and a starting face can get 42 dice for his intimidation. I know.
But while it is a starting character, it still is a uber-leet-pro hacker/face. |
|
|
Jun 6 2006, 03:47 PM
Post
#7
|
|||
Dragon Group: Members Posts: 4,718 Joined: 14-September 02 Member No.: 3,263 |
The Threshold is Firewall + modifiers for the type of account. At the same time the system is rolling it's own Firewall plus Analyze against your Stealth. If as a GM you haven't determined the rating of the Analyze program you can just set it to the maximum, which is System. So that might be where your idea of Firewall+System comes from. I haven't read Sebitar's document though, so maybe I have the context wrong here?
|
||
|
|||
Jun 6 2006, 03:56 PM
Post
#8
|
|
Target Group: Members Posts: 26 Joined: 17-May 06 Member No.: 8,568 |
Probing is sys+firewall! I knew I saw that somewhere. I'll check more in depth when i have my book on hand.
|
|
|
Jun 6 2006, 04:58 PM
Post
#9
|
|||
Shooting Target Group: Members Posts: 1,754 Joined: 9-July 04 From: Modesto, CA Member No.: 6,465 |
Looks good so far, I like the examples, something often overlooked IMO. My Wishlist - I'd really like a screamsheet for quick look-ups with SR4 references as well as to your own documentation. Nice indeed! :D |
||
|
|||
Jun 6 2006, 06:02 PM
Post
#10
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
edited because dark is right
|
|
|
Jun 6 2006, 06:18 PM
Post
#11
|
|
Target Group: Members Posts: 26 Joined: 17-May 06 Member No.: 8,568 |
Hacking on the Fly is just Firewall
Probing is Firewall+System |
|
|
Jun 6 2006, 07:50 PM
Post
#12
|
|
Moving Target Group: Members Posts: 371 Joined: 10-January 06 From: Regina Member No.: 8,145 |
Right, and remember when you are Probing the target, the node only gets one test to detect you at the moment you actually "enter" the system. So, Probing the Target takes much longer but the chance of being detected is much less.
|
|
|
Jun 6 2006, 09:04 PM
Post
#13
|
|||
Shooting Target Group: Members Posts: 1,754 Joined: 9-July 04 From: Modesto, CA Member No.: 6,465 |
General question about breaking in either Brute Force or Probed: How long does the successful attempt last? More specifically, how long if you successful Hack attempt go for? Book mentions something about paranoid systems changing passwords and such often, but what about Brute Force? |
||
|
|||
Jun 6 2006, 09:23 PM
Post
#14
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
I would say: Only for this try. Remember, you are not getting account data by hacking in, you are exploiting a weakness to get into the system.
|
|
|
Jun 6 2006, 09:53 PM
Post
#15
|
|||
Shooting Target Group: Members Posts: 1,754 Joined: 9-July 04 From: Modesto, CA Member No.: 6,465 |
I guess it's how you'd define the exploit then considering there are all sorts of exploits that could be either lasting (until patched) or just a repeatable process that takes time and has to be repeated. |
||
|
|||
Jun 7 2006, 02:10 PM
Post
#16
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
Hm of course, as everything in SR4 matrix, this is up to interpretation. But I think we need some "normaly it works lie this" guidelines.
|
|
|
Jun 7 2006, 05:58 PM
Post
#17
|
|
Target Group: Members Posts: 52 Joined: 2-February 04 Member No.: 6,051 |
A slightyly off-topic question. Does anyone else get the impression that there aren't supposed to be individual 'nodes' to a system anymore? Some of the GM cheat sheets that I've seen seem to indicate some people think otherwise, but it really looks like RAW indicate that a host is now like one huge node instead of multiple subsystems. Much easier to deal with, but a real departure
|
|
|
Jun 7 2006, 06:57 PM
Post
#18
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
Every device and every comlink is a node. Appart from that I would minimize the number of nodes that a full blown matrix host system (like the system of a corp facility) consists of to about 2-3 out of gameplay reasons.
Problem is: You need some fluff reason for that. (No reason not to make corporate system out of 100 medium level comlinks) |
|
|
Jun 7 2006, 07:18 PM
Post
#19
|
|||
Shooting Target Group: Members Posts: 1,754 Joined: 9-July 04 From: Modesto, CA Member No.: 6,465 |
It's very general. You can make a system as complex or simple as you like. What I'm discovering is it's really all about what a Admin, Security or Personal account lets you do with those nodes. If you make the accounts blanket the whole system, that is getting Admin gives you the keys to the whole place, then you have to make sure other things are in place like databombs, encryption or patrol IC (for example) to make up for the generality of the account types. If instead you made each sub-system require it's own Account types, that is, Finance Node Admin can't access Security Node things unless they login as Admin there, then the multiple hack attempts should be factored into the security measures. Sure you'd have IC, Encryption and the like, but you've made the system "harder" to hack by including required re-login attempts. Personally, I am trending towards using Access ID's or Passkey modules and using blanket type accounts (as in my first example). Yes you can hack those, but unless you've got some inside information chances are you'll be discovered. |
||
|
|||
Jun 7 2006, 07:21 PM
Post
#20
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
I would say that a hacked admin account is only valid for the hacked node. Remember: You do not get something like login and password when you hack in, you absue something tht gets you the targetetd account on that node.
So even if one admin account (same login, password, fingerprint, retina . . .) is valid on different nodes, you would have to hack into ech one seperately. |
|
|
Jun 7 2006, 07:58 PM
Post
#21
|
|||
Shooting Target Group: Members Posts: 1,754 Joined: 9-July 04 From: Modesto, CA Member No.: 6,465 |
Depends on how you'd like the thing built. Forcing a hacker to re-exploit additional logins means they'll have more of a chance to trigger an alarm. I can see this in place of say, Patrolling Analyze-IC or something else designed to find illegal logins unless paranoia dictates the need for lots of account checking. |
||
|
|||
Jun 8 2006, 06:59 PM
Post
#22
|
|
Shooting Target Group: Members Posts: 1,754 Joined: 9-July 04 From: Modesto, CA Member No.: 6,465 |
Serbitar, I just noticed you use and define the term Matrix ID in this doc. Isn't this the same as Access ID per SR4?
|
|
|
Jun 8 2006, 07:14 PM
Post
#23
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
yes, I will call it thus in future releases, still in process of synchronizing everything
|
|
|
Jun 16 2006, 07:40 PM
Post
#24
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
SGM preview v0.9 out now!
|
|
|
Jun 19 2006, 11:22 PM
Post
#25
|
|
Running Target Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
As lots of matrix related questions are coming up, I want to bump this thread and encourage discussion of my solutions. (constructive) Comments are always appreciated.
|
|
|
Lo-Fi Version | Time is now: 6th October 2024 - 08:12 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.