My Assistant
![]() ![]() |
Jun 16 2006, 04:16 AM
Post
#26
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,266 Joined: 3-June 06 From: UK Member No.: 8,638 |
Is that God Save the Queen by the Sex Pistols?
|
|
|
|
Jun 16 2006, 04:34 AM
Post
#27
|
|||||
|
Moving Target ![]() ![]() Group: Members Posts: 137 Joined: 8-June 06 From: Present day, Detroit Member No.: 8,683 |
beautiful analogy. how could my friend listen to my mom (or anybody?) if he's humming real loud with his fingers in his ears? does the fact that i told him to give him this ability? but i see that you mean that he will only take orders from my mom and not anyone else (ala subscription list). My analogy to the attack would be, grabbing his hands from his ears and punching him or throwing the sandwich or wherever we're going with this. I'm not trying to pretend to be the authorized user and give orders, i'm busting in and breaking things (locating the node, hacking in, and taking it from there, in this case crash OS action) and why would an analogy for attack involve giving orders? do you give orders to another icon, OS, my mom etc. when you attack them in (cyber)combat? I thought it was that "Attack programs are hostile code carriers that attempt to kill processes, introduce random input, create buffer overflows or program faults, and otherwise make a program/icon crash." What I am wondering is, do you have to go through the commlink of a subscribed drone in order to crash(OS) it? if subscribed drones are immune to hacking, is there a pressing need for firewall for them? so basically, what i'm trying to be convinced of, is that spoofing is the only way to deal with drones. |
||||
|
|
|||||
Jun 16 2006, 05:01 AM
Post
#28
|
|||||||||
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
This has been left as an exercise to the reader (HINT: it involves having your mom tap your friend on the shoulder so he or she looks to see if it's really her).
Here's a question for you: which processor kills the processes, takes the random input, has the overflowing buffer, and finds the program faults? (HINT: It's the target's processor.) Okay, that wasn't really a hint, but the point is it's still the target processor that gets proverbially narfed hardcore. Consider, if you will, a bit of malware that gets on your machine. It's running on your machine; if the processor isn't being made to screw up, it won't get screwed up. In order for a processor to do anything, it needs instructions. In order for a processor to suffer hardcore narfage (proverbial or otherwise), it needs to receive malicious instructions, as with your (ex-)friend stabbing himself or herself in the nostril.
They're not immune to hacking, it's just that you have to spoof your ID every time you try your Exploit or your Attack. It's more efficient to just spoof a command to include you on its subscription list and then Exploit it, Attack it, or just plain give it commands that its owner won't like. And Laziness and Impatience are the First and Second Great Virtues of a Programmer.
At the risk of telling you that you are wrong again, you're wrong again. Jammers are quite effective against drones that are being directly controlled by their rigger owners. An anti-vehicle rocket or a high volume of fully automatic fire works nicely, too. Spells involving electrical effects can do a number on a drone, too. Oh, unless you meant spoofing being the only way to deal with drones when you have a commlink. In which case, yes, you've got it. |
||||||||
|
|
|||||||||
Jun 16 2006, 05:09 AM
Post
#29
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 560 Joined: 4-March 06 From: Pueblo Corporate Council Member No.: 8,332 |
So you tell your friend, "I'm going to tell you how to make a sandwich, and what to do with it, and you can't listen to anyone but me." And then the neighbor kid comes in, disguised as you and says, "give me the sandwich." And your friend does. That's spoofing.
But when the neighbor kid comes in, trips your friend, grabs the sandwich and runs, that's hacking. Two completely separate ways of compromising a drone. And firewall is your defense against hacking. In answer to your specific question (sort of), you do have to go through a drone's wirless connection. But with hacking, you're not talking with it (which would require a subscription, real or faked), you're trying to fry it. |
|
|
|
Jun 16 2006, 05:11 AM
Post
#30
|
|||
|
Moving Target ![]() ![]() Group: Members Posts: 560 Joined: 4-March 06 From: Pueblo Corporate Council Member No.: 8,332 |
Show us the rules. Explain. Please. I've been waiting for two weeks for someone to justify this using the RAW. |
||
|
|
|||
Jun 16 2006, 05:30 AM
Post
#31
|
|||
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
Negative. That's shooting the drone down and taking its commlink. In order to be hacking anything, you have to have access to its processes, and beating up the drone isn't the way to do it. |
||
|
|
|||
Jun 16 2006, 05:47 AM
Post
#32
|
|||||||||||||||
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
Okay, here we go.
And a bit of indirect evidence:
Note the lack of mention of Analyze or IC in the last quote. If that's not good enough for you, then we'll have to wait for the next rigger book. Meanwhile, feel free to GM your own game and run it any old way you want. =) |
||||||||||||||
|
|
|||||||||||||||
Jun 16 2006, 08:20 AM
Post
#33
|
|
|
Target ![]() Group: Members Posts: 81 Joined: 19-May 06 Member No.: 8,576 |
That makes perfect sense and definitely seems to follow the RAW. So is there a reason other than money to not fill a commlink full of IC designed to verify your commands then duct tape the thing to the back of the drone and plug that bad boy in with fiber optics, leaving your drones brain (presumably also a commlink or something like it) free for autosofts and the like?
Or do commlinks not have more than one type of 'on' when it comes to being wireless? Can you set a commlink to only act as a relay for drone commands without allowing it real wireless networking access? By the rules I mean, obviously it is possible logically. I get radio on my computer but I not exactly concerned about catching a virus from it. |
|
|
|
Jun 16 2006, 10:25 AM
Post
#34
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
Thanks, Aaaron, thats the way I would quote RAW to justify my rules interpretation, too.
|
|
|
|
Jun 16 2006, 12:22 PM
Post
#35
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
Aarons RAW interpretation is correct as long as you want to SPOOF a command, there are other ways as well.
Let's assume that we cannot find the persona of the owner so we cannot spoof, then we do the next best thing. We locate the wireless signal and insert fake orders and/or give it new files to upload or shutdown commands. Hacking a drone by accessing it's wireless signal is also viable since a drone is an OS in itself, the pilot program is an OS and can therefore be hacked like any commlink. Spoofing would only be needed if you want to fake being the real user, as long as you sit with your stealth program and being a hacker intent on hacking the drone system then spoofing command will not be needed. Intercepting Wireless signal: SR4 page 225. The sentences Aaron has quoted is what I would take as a LEGAL way of accessing drones. For ILLEGAL ways when you CANNOT spoof it you can always hack it and sneak into its system, then you replace its subscription list so that YOU are the controlling persona. Intercepting the signal from the controlling user to the drone and editing the infrmation is also a tactic. Spoofing is just the simplest way, there are always more than one way of tackling a problem. |
|
|
|
Jun 16 2006, 03:43 PM
Post
#36
|
|||||||
|
Moving Target ![]() ![]() Group: Members Posts: 137 Joined: 8-June 06 From: Present day, Detroit Member No.: 8,683 |
Yeah I guess I didn't consider touching when making an analogy about wireless.
Well, I'll admit i don't know IT from ET, so i'm just going to use the SR rules here to fuel my argument. We got two things here, we got Command and we got Attack. In order to command the drone via the matrix, you have to have "accessed it and linked to it as a subscriber" (p. 238). Ok. if i want give the drone faulty instructions, then I must scan for the controlling riggers commlink (it's probably in hidden mode), make a matrix perception test on the controlling riggers commlink, and finally be a spoofy mcspooferson and spoof some forged instruction to the drone. On the other hand, I see the drone out there. It's floating around in the matrix somewhere, just like me and the controlling rigger. We are all nodes. I find the drone node just like i did with the riggers commlink, only instead of trying to command it (which it wouldn't accept) I hack it's firewall (with the standard +6 since its admin only). and then if successful, proceed to crash it's OS.
While I do appreciate the condescending attitude, I think it was obvious I was only concerned with hacking drones/riggers and not looking for an exhaustive list of how to destroy/confound a drone. thanks though. |
||||||
|
|
|||||||
Jun 16 2006, 03:50 PM
Post
#37
|
|||||
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
That seemed snarky, Serbitar. I wonder if that was intentional.
I used to think that would work, too, and tried it out in my own game, but my GM made two interesting points that convinced me otherwise. First, wireless traffic is moving at the speed of light. How is anybody supposed to receive, analyze, edit, and transmit it fast enough to make it work? Second, the bit about editing and inserting the signal comes after the bit about copying, recording, or forwarding the signal, the implication being that the Edit action is for the recorded data about the command, not for the command itself. He said, and I agreed, that if my commlink was the only path between the rigger and the drone, then I could delay the traffic headed for the drone and control the traffic stream, but since that is rarely the case, I couldn't. He also brought up the fact that if it was that easy hijack a drone, people would stop using drones in combat, but I'm not sure how convincing that argument would be with this crowd. |
||||
|
|
|||||
Jun 16 2006, 03:57 PM
Post
#38
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,498 Joined: 4-August 05 From: ADL Member No.: 7,534 |
I have no idea what "snarky" is . . .
|
|
|
|
Jun 16 2006, 04:10 PM
Post
#39
|
|
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
Snarky == sarcastic. I wasn't sure whether you were being sarcastic or not. That time or this one, for that matter.
>>> Edit: Urban Dictionary explains it way better than I do. First hit on Google for "snarky," too. |
|
|
|
Jun 16 2006, 04:30 PM
Post
#40
|
|||||||||||||
|
Moving Target ![]() ![]() Group: Members Posts: 137 Joined: 8-June 06 From: Present day, Detroit Member No.: 8,683 |
But then in the following paragraph (interestingly beginning with "In game terms")
Ok, it says "that you are accessing and are allowed to establish communication with you." I don't see, "that you are accessing and are only allowed to establish communication with you." To me, it looks like subscription lists are a limit on the number of nodes you can actively access, as well as a defense against having every node around you cluttering up your PAN. Not some pseudo firewall.
The controlling persona of the drone is one that has "accessed it and linked to it as a subscriber." Ok. But we're not talking about issuing orders (see command). we're talking about hacking a drone. "Hacking is centered around defeating a node's firewall and breaking in" (p.221).
I was wondering why drones would have a firewall at all in the subscriber spoof only world, so this at least goes a little way to convince me.
You use Analyze to make a matrix perception tests (p.217) which is necessary for spoofing (p.224) so if anything this supports the hack-the-drone angle. IC is casually mentioned elsewhere (top of 223)
Or at the very least a FAQ (c'mon we're rolling on a year now) but yeah. |
||||||||||||
|
|
|||||||||||||
Jun 16 2006, 05:00 PM
Post
#41
|
|||
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
You also use Analyze to detect intrusion attempts (Boyle et al. 221). It's the first line of defense against Exploit use. I consider it to be the best, since detection leads to alert, and an alert gives a free +4 bonus to a node's Firewall, and can activate IC. Neither Analyze or IC are listed among the preferred programs of the rigger on page 238, which indirectly argues that they are not as important as the programs that are listed. That was my point. |
||
|
|
|||
Jun 16 2006, 05:09 PM
Post
#42
|
|||||
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,431 Joined: 3-December 03 Member No.: 5,872 |
And that's the point where anyone who knows peanut butter insults your masculinity. Creamy peanut butter what's next milk chocolate or fru fru bevrages, or how about the unholiest of unholies sweetened ice tea.(man how can a region that gave us biscuits and gravy give us that) :D |
||||
|
|
|||||
Jun 16 2006, 05:29 PM
Post
#43
|
|||||
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
Look, what's the first step in making peanut butter? Crush up the peanuts (remember that song?). If there are peanut chunks in the peanut butter, it is, at worst, impure because stuff has fallen into it, and at best unfinished. Dunkelzahn would have agreed with me. |
||||
|
|
|||||
Jun 16 2006, 05:29 PM
Post
#44
|
|||||
|
Moving Target ![]() ![]() Group: Members Posts: 137 Joined: 8-June 06 From: Present day, Detroit Member No.: 8,683 |
Alright. I guess I'm thinking of using analyze in an offensive posture and you're describing it in a defensive posture. But you still need it to spoof. And if spoofing is the only way to affect a subscribed drone, why would it not be listed? In the hack the firewall approach, analyze is unnecessary. |
||||
|
|
|||||
Jun 16 2006, 05:32 PM
Post
#45
|
|||||||
|
Moving Target ![]() ![]() Group: Members Posts: 137 Joined: 8-June 06 From: Present day, Detroit Member No.: 8,683 |
yeah crunchy peanut butter is an abomination. which reminds me how much i hate that Take 5 candy bar. peanunt butter and peanuts shouldn't count as two separate "ingredients" first off, it's the same thing only one is smashed, and two, it's already called crunchy peanut butter. |
||||||
|
|
|||||||
Jun 16 2006, 05:34 PM
Post
#46
|
|||
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
It's not listed for riggers because riggers have a much more direct approach to dealing with enemy drones: use their own drones to shoot them down. The rigger is concentrating on rigging, the hacker on hacking. Besides, one only needs one lousy hit to get the ID of a commlink. |
||
|
|
|||
Jun 17 2006, 05:03 AM
Post
#47
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 560 Joined: 4-March 06 From: Pueblo Corporate Council Member No.: 8,332 |
Now, just because all of your devices can talk to other devices doesn’t mean that they will. For simplicity, privacy, and security, you may configure your devices so that they only interact with another specific device (usually your commlink, as your PAN’s hub) or a specific network (your PAN). This prevents confusion between users (am I accessing my guncam or yours?) and also offers a degree of protection from snoopers and hackers. Rather than allowing any stranger access to all of your electronics, anyone that wants to interact with your PAN must connect to your commlink first.
This is about communication, not attacking. I consider the subscription list and ID to be like logins and passwords. You want to interact with my PAN, I must first let give you the password. If I don't, then you can try to hack into my comm. Note also, that this is not a rules section, so much as it is giving a general description of how things work, so the player has an idea of what is going on in 2070. Slight difference - not as precise. Note that agents and drones will only take orders from their controlling persona, unless another persona spoofs an order (see Spoof Command, p. 224). If the controlling character chooses, he can instruct the agent or drone to receive orders from other specified personas. This describes spoofing. And I dont think there is any appreciable difference between my interpretation of the spoofing procedure, and yours. To manipulate a drone, you must first have accessed it and linked to it as a subscriber (see p. 212). Same deal. Manipulation is not the same as electronic warfare. Plus, to manipulate a drone after hacking it, you must have first accessed it (which you did, because you just hacked it), and linked to it as a subscriber. This part is irrelevant, because by the time you've accessed it, your icon is already inside it, so you're not a subscriber. Or could say that since you've hacked it, you can put yourself on its subscription list. To spoof commands, you must beat the agent or drone in an Opposed Test between your Hacking + Spoof and the target’s Pilot + Firewall. Again, spoofing is different than hacking. Riggers also don’t usually spend the time or money to buy up or program their own top-notch hacking utilities, preferring instead to focus on a good Signal strength, good Scan, Command, Encrypt, and Sniffer programs, and of course, plenty of drones with amped Pilot, Response, and Firewall attributes of their own. Note the lack of mention of Analyze or IC in the last quote. I'm not sure they have to mention every possible improvement. If that's not good enough for you, then we'll have to wait for the next rigger book. Meanwhile, feel free to GM your own game and run it any old way you want. =) And you yours. :-) Negative. That's shooting the drone down and taking its commlink. Okay, then I have no clue what that otherwise entertaining analogy was supposed to mean. Anyway... Let's say you've logged in to Dumpshock. I track down your IP, and use it to log in there under your name. The forum thinks I'm you. That's spoofing. Now let's say that I don't mess with getting your info - I just hack the site. I can make it think I'm you or anybody else. That's hacking on the fly. I dont need to forge a password, I just brute-force my way in. Edited: sorry the quote tags didn't work. |
|
|
|
Jun 17 2006, 05:16 AM
Post
#48
|
|||||
|
Moving Target ![]() ![]() Group: Members Posts: 560 Joined: 4-March 06 From: Pueblo Corporate Council Member No.: 8,332 |
If the point of attacking (which I take to mean hacking on the fly, which is a hacking+exploit roll) is to get access to the node,
why would you need to spoof? I mean, if you have the ID, you don't need to attack - you're in! |
||||
|
|
|||||
Jun 17 2006, 06:35 AM
Post
#49
|
|
|
Mr. Johnson ![]() ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
Mr. or Ms. wind_in_the_stones, riddle me this:
How could you hack, as you say, Dumpshock if the site ignores all of the network packets coming from you? How about if the site ignores all packets except those coming from me? Hm. Y'know, it just occured to me that you may have a disconnect on how network communication works. In case you do, I'll explain it in a nutshell. In case you don't, I'll encapsulate it in a spoiler tag. [ Spoiler ] Also, I don't know if I brought up this point in this thread or another, but if it really was that easy to defeat a drone, why would riggers use them? |
|
|
|
Jun 17 2006, 03:02 PM
Post
#50
|
|||||
|
Moving Target ![]() ![]() Group: Members Posts: 560 Joined: 4-March 06 From: Pueblo Corporate Council Member No.: 8,332 |
Male, thanks for asking. (Took the handle from the name of a favorite character.) Thanks for the info about network communication. Would you please explain hacking? And in game terms, what does hacking get you, as opposed to simply spoofing?
Sounds to me like you're trying to house-rule to cover a percieved game imbalance. :P Okay, how about Probing the Target? Do I need an ID to probe? Probing is exactly the same as Hacking on the Fly, with regards to purpose. "...identifying flaws that can be exploited for access." And from hacking, "...find an exploit that will get you in..." As I said before, why would you need to hack if you had an ID? |
||||
|
|
|||||
![]() ![]() |
|
Lo-Fi Version | Time is now: 12th April 2022 - 06:49 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.