IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Decking tutorial, sr3
Platinum
post Jun 13 2006, 04:29 AM
Post #1


Running Target
***

Group: Members
Posts: 1,095
Joined: 26-February 02
From: Ontari-airee-o
Member No.: 1,115



I am going over the sr3 rules for decking again, and I need some clarification on a few things, and I am trying to write up a quick tutorial.

Your deck is pretty hot and has 8/6/6/6/6. Computer skill of 6.

Host is a soft system Orange-6 9,8,7,8,7
Security sheaf:
3 Probe 5
7 Probe 7
10 Killer 8, passive
13 Killer 10, active
16 shutdown

You pull up to the SAN and you see a gate attendant, and a hell hound(6)blaster just inside.

You have your sleaze (5) and deception(6) fired up, and you run your "logon to host"(access) test.

It is an opposed test.
Decker gets 6 + hacking pool TN 3 {Access rating(9) - deception(6) = 3}
System gets its rating(6) TN 6 {Masking(6) + Sleaze(5) /2 =5.5 round up}
(personally I am just going to just drop the sleaze program, seems silly to me)

Any successes by host are added to Security Tally.
The decker passes the gate now he can fire up the Analyze(4) try an figure out the hell hound.

Does the decker use the control rating of the host or the rating of the IC as the base TN?
Assuming rating of IC:
He runs the Analyze IC control test Sensor rating (6) TN 4 {IC rating(8) - Analyse(4)}

Assuming control rating:
He runs the Analyze IC control test Sensor rating (6) TN 5 {IC rating(9) - Analyse(4)}


Is this an opposed test?
System rating TN MCPC of deck? Would the system counter successes still add to the tally?

Satisfied that he knows what the hound is, our decker decides to search for a phone log file for the date 1/1/61.

He runs an Index test Computer(6) + hacking TN 5 {Index Rating(8) - Browse(3)} VS Security rating(6) TN 6 {Masking(6) + Sleaze(5) /2 =5.5 round up}

Any successes by host get added to tally.

Is this close so far? more to come.


Go to the top of the page
 
+Quote Post
silvermain
post Jun 13 2006, 04:43 AM
Post #2


Target
*

Group: Members
Posts: 9
Joined: 19-March 02
Member No.: 2,416



We had a great thread dealing with the ins and outs of deckingidiots guide to the matrix. You should be able to find a lot of info from there.
Go to the top of the page
 
+Quote Post
Slump
post Jun 13 2006, 05:33 AM
Post #3


Moving Target
**

Group: Members
Posts: 295
Joined: 10-July 05
Member No.: 7,492



Also, if you use the rules for creating a random security sheaf, they are way, way longer than the sample ones. Even a red host gets to a tally of like 50-70 before shutting down, and a green host can hit a tally of 200 before shutting down, by the dice.

I wrote a program for my TI-85 to dynamically generate security sheafs. You put in the color code and the system rating. It comes back with what is triggered when the tally reaches the next trigger step. You hit enter, and it'll give you the next trigger step and IC triggered. It'll also tell you when alerts happen and the shutdown.

Go to the top of the page
 
+Quote Post
Synner
post Jun 13 2006, 11:52 AM
Post #4


Runner
******

Group: Members
Posts: 3,314
Joined: 26-February 02
From: Lisbon, Cidade do Pecado
Member No.: 185



QUOTE (silvermain)
We had a great thread dealing with the ins and outs of decking idiots guide to the matrix. You should be able to find a lot of info from there.

Ah... the fond memories, back when I had time to spend on stuff like that.
Go to the top of the page
 
+Quote Post
Platinum
post Jun 13 2006, 12:56 PM
Post #5


Running Target
***

Group: Members
Posts: 1,095
Joined: 26-February 02
From: Ontari-airee-o
Member No.: 1,115



QUOTE (silvermain)
We had a great thread dealing with the ins and outs of deckingidiots guide to the matrix. You should be able to find a lot of info from there.

Slump:
what is the URL?

Thanks guys.

I came across it once before, but when I searched on decking, tutorial, and a few other keywords, I could not find it. Thanks for the link.
Go to the top of the page
 
+Quote Post
Platinum
post Jun 13 2006, 12:57 PM
Post #6


Running Target
***

Group: Members
Posts: 1,095
Joined: 26-February 02
From: Ontari-airee-o
Member No.: 1,115



Any status on the archives? Those are the first few links in the posts. would be nice to get those old threads saved somewhere.
Go to the top of the page
 
+Quote Post
Platinum
post Jun 13 2006, 01:36 PM
Post #7


Running Target
***

Group: Members
Posts: 1,095
Joined: 26-February 02
From: Ontari-airee-o
Member No.: 1,115



Questions about decking:

QUOTE (Synner)

[edit] Since Probe is reactive IC the GM just makes a secret Sensor Test (SR3 page 209) for the decker (4) against a Target number equal to the IC's rating ( 8 ), the decker gets very lucky and rolls 2 successes finding out that this Recepcionist Icon is a Cutie8.1 Probe IC and is asking for the passcode that identifies him as a legitimate user. If he had failed the test, the recepcionist would have just noted his unauthorized presence, said nothing and the IC would have remained undetected.[/end edit]

You now have a choice:
a) you either enter Cybercombat and try to nuke the Probe IC and then surpress it or;
b) you don't reply and from that point on the Host adds the Probe's rating ( 8 ) to all Security Rating (9) rolls against the decker's Detection Factor (7). Meaning that after Probe is triggered the System starts rolling 17 dice every System Operation you make.

Note - Although I don't think it's clearly stated anywhere that I recall, IMHO it should be assumed that possessing a Validated Account (see above) means you can show Probe IC a valid passcode and the IC returns to its passive state. This is another good reason to do a recon hack.
Note2 - When I've had time to work out the metaphor before hand and I think the decker is in the mood for some more color, I use the IC or Program's rating as a version number so I don't have to break from in character description (ie. a "Cutie8.1 Probe" for a Probe - 8 IC).


Is there some utility that you can use to try and sleaze the probe and fake credentials? Which if successful it would reset the probe back to passive, but also add to the security tally. Could you do another logon test?
:edit: removed sophisticated
Go to the top of the page
 
+Quote Post
Kagetenshi
post Jun 13 2006, 01:45 PM
Post #8


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,006
Joined: 30-December 02
From: Boston
Member No.: 3,802



"More sophisticated"?

~J
Go to the top of the page
 
+Quote Post
Platinum
post Jun 13 2006, 02:08 PM
Post #9


Running Target
***

Group: Members
Posts: 1,095
Joined: 26-February 02
From: Ontari-airee-o
Member No.: 1,115



Last comment removed, anyone care to help with the question?
Go to the top of the page
 
+Quote Post
maneius
post Jun 13 2006, 02:17 PM
Post #10


Target
*

Group: Members
Posts: 42
Joined: 7-March 04
Member No.: 6,130



Nothing to see here. Ignore me.
Go to the top of the page
 
+Quote Post
Kagetenshi
post Jun 13 2006, 03:03 PM
Post #11


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,006
Joined: 30-December 02
From: Boston
Member No.: 3,802



If you're asking about the rules as they are now, the answer is "no". If you're asking whether it might make sense to add rules to do that, I'll need to know what you want to achieve with that to comment.

~J
Go to the top of the page
 
+Quote Post
Platinum
post Jun 13 2006, 03:22 PM
Post #12


Running Target
***

Group: Members
Posts: 1,095
Joined: 26-February 02
From: Ontari-airee-o
Member No.: 1,115



Well, what I am trying to achieve is a way to passively circumvent the IC.

What I was thinking should happen is you have the ability to ask for credentials. (some details of your activity are suspicious, so they ask for a revalidation)
The odds are that this will increase the security tally because this will be a system test (essentially another logon test). If the decker succeeds, the probe goes passive again but the odds are that the system will ratchet up some additional successes and increase the security tally. (possibly triggering more ic, like a trace, which is not a big deal if you are a legit user) If the decker ignores the request.. then the tally goes up by the probe's rating. Or you can attack it, then suppress it.
Go to the top of the page
 
+Quote Post
Kagetenshi
post Jun 13 2006, 05:11 PM
Post #13


Manus Celer Dei
**********

Group: Dumpshocked
Posts: 17,006
Joined: 30-December 02
From: Boston
Member No.: 3,802



With probe IC, the ways to accomplish that are ignoring it or logging off and trying later when things calm down. IMO it doesn't make sense to be able to make things calm down, on account of the system already having detected suspicious behaviour.

Though I think ultimately this comes down to the conflict between decker-has-tally (in which case the probe really is responding to you personally) and system-has-tally (in which case the probe is responding to suspicious activity, and if you prove you're legit that just means it has to look elsewhere (while it continues watching you) to find the source of the activity).

~J
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 20th April 2024 - 12:51 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.