IPB
X   Site Message
(Message will auto close in 2 seconds)

Welcome Guest ( Log In | Register )

2 Pages V  < 1 2  
Reply to this topicStart new topic
> Hacking a Technomancer, is it doable?
TheOOB
post Mar 7 2007, 04:00 PM
Post #26


Running Target
***

Group: Members
Posts: 1,290
Joined: 23-January 07
From: Seattle, USA
Member No.: 10,749



The node does have a practical use though, it's a well protected center hub that the technomancer can link all of their wireless eq to and easily defend should the situation come to it.
Go to the top of the page
 
+Quote Post
Ranneko
post Mar 8 2007, 11:45 AM
Post #27


Moving Target
**

Group: Members
Posts: 349
Joined: 16-January 05
Member No.: 6,984



It's also a great place to compile a sprite, after all, if you fall unconcious, the node will crash, and the sprite will be gone, unable to cause havoc. =P
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Mar 8 2007, 11:58 AM
Post #28


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (TheOOB)
You could crash the technomancers node though, which would be kinda pointless(they can just reboot themselves) and make them very very very mad.

It takes ages for a TM to reboot, so it's not that useless.
Go to the top of the page
 
+Quote Post
Wasabi
post Mar 8 2007, 12:20 PM
Post #29


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



QUOTE (Ranneko)
It's also a great place to compile a sprite, after all, if you fall unconcious, the node will crash, and the sprite will be gone, unable to cause havoc. =P

BRILLIANT!
Go to the top of the page
 
+Quote Post
Glayvin34
post Mar 9 2007, 06:07 PM
Post #30


Moving Target
**

Group: Members
Posts: 351
Joined: 17-February 06
From: San Francisco
Member No.: 8,275



QUOTE (TheOOB)
The node does have a practical use though, it's a well protected center hub that the technomancer can link all of their wireless eq to and easily defend should the situation come to it.

I wanted to through in a few cents here because I love to argue about TMs.

Seems like everyone agrees that you can't hack a TM traditionally in order to load agents on their brain and steal paydata via Exploit.
But you can hack the PAN with Spoof. If you spoof the commcode of one of the TM's subscribed devices, then you're subscribed to the TM's Living Persona node, and you can access the TM's PAN, including external storage devices. Of course, you would need to exploit your way into the other devices in the PAN.

This actually brings up another question that I've been pondering. Imagine one were to access a TM's PAN via Spoofing his smartlink's commcode. So any insidious commands coming from your commlink would look like packets from his gun to the TM. You would have signal access to all of the devices subscribed to the TM's Living Persona. If you then began hacking an external memory module, would the TM know?
Would he notice that his gun is trying to exploit its way into his datachip? The commands are passing through his brain, after all.
Go to the top of the page
 
+Quote Post
Lantzer
post Mar 9 2007, 06:52 PM
Post #31


Moving Target
**

Group: Members
Posts: 693
Joined: 26-March 03
Member No.: 4,335



The way I see it:

A TM is a wireless comlink with matrix attributes, that has no local file storage. This means that you can hack them, and possibly take them over if you can give yourself admin priviledges fast enough. You can't load files onto the node, but you can run any program from your own comlink like normal.




So, what can we do there?

1) Create an account?
2) Crash the node?
3) Control slave devices (cyber/sprites - its not spoofing if you are inside - its a command slave action - the sprite got its commands through normal channels)?
4) Alter the subscription list?
5) Send a comcall?
6) Add your own options?

Are any of the above answers different if the intruder is also a TM?
Does the lack of local storage mean anything with the proliferation of storage off-node? Even standard hackers are not considered limited by available local storage - Download as much as you like! As far as I can tell, the limitation on local storage means only one thing: the TM or others cannot run ordinary programs or agents on his node.

Is there any reason a sprite could not use suppression while hacking a TM?

Blog and I are in the same game - This question came up last week and there were "Hrmm?"s all around.
Go to the top of the page
 
+Quote Post
Konsaki
post Mar 9 2007, 06:59 PM
Post #32


Runner
******

Group: Members
Posts: 2,526
Joined: 9-April 06
From: McGuire AFB, NJ
Member No.: 8,445



I dont want to punch too many wholes in your last idea, because it was creative, but it wont work unless your hacker first gets within the 3m range of the TM and manages to stay within those 3m to perform a full Scan test to find the hidden items.
Then the hacker has a chance to get into the TM's network by spoofing his commcode to the same as, in your example, the TM's Smartlink. A problem with trying to spoof a smartlink or anything else though is the fact that most PAN's are set up in a Star Topography configuration with the Commlink, TM's Brain in this case, as the central hub that everything else is slaved to.

A TM or Hacker should easily notice that their Smartlink, which only gives targeting data information to the goggles through the Commlink, is now requesting a datasearch of your PAN. You get where I'm going with this right? The TM/Hacker would turn off his Smartlink and see that it is still requesting the info. From there, it's a counter hack situation that the TM has the upper hand with since he knows you are spoofing his Smartlink's commcode and just uses that to hack your commlink.
Go to the top of the page
 
+Quote Post
Glayvin34
post Mar 9 2007, 07:11 PM
Post #33


Moving Target
**

Group: Members
Posts: 351
Joined: 17-February 06
From: San Francisco
Member No.: 8,275



QUOTE (Konsaki @ Mar 9 2007, 01:59 PM)
A TM or Hacker should easily notice that their Smartlink, which only gives targeting data information to the goggles through the Commlink, is now requesting a datasearch of your PAN.

This is the aspect that I think requires interpretation or even house-ruling. The rules are silent on how exactly the data is moving through the TM's head. If the TM is subscribed to a drone or two, his vehicle, the three commlinks of his buddies, his smartlink, and maybe another few devices, there would be a lot of traffic going through his head.
Would he be paying attention to each bit of data that moves through? That also makes me wonder if "house keeping" network activities like relaying positioning telemetry is a conscious act by a TM or something that runs on its own unconsciously.

EDIT: Would there be a roll necessary to notice that a device is acting strangely, as if it had been compromised?
Go to the top of the page
 
+Quote Post
Glayvin34
post Mar 9 2007, 07:19 PM
Post #34


Moving Target
**

Group: Members
Posts: 351
Joined: 17-February 06
From: San Francisco
Member No.: 8,275



QUOTE (Lantzer)
A TM is a wireless comlink with matrix attributes, that has no local file storage. This means that you can hack them, and possibly take them over if you can give yourself admin priviledges fast enough. You can't load files onto the node, but you can run any program from your own comlink like normal.

I don't think that you can get admin privileges for someone's brain. Even though TMs function like computers, they aren't machines. If you spoof a command to tell a drone to attack it's master, it will. If you spoof a command to a TM telling him to do the same thing, he'll tell you to shove that command up your keister.

QUOTE (Lantzer)
1) Create an account?
2) Crash the node?
3) Control slave devices (cyber/sprites - its not spoofing if you are inside - its a command slave action - the sprite got its commands through normal channels)?
4) Alter the subscription list?
5) Send a comcall?
6) Add your own options?

These are different if the target is a TM because they require the use of programs that only work on software. You can't create an account because there's no list of accounts to Edit. You can't alter the subscription list for the same reason. It's still a toss-up as to whether or not you can communicate with slaved devices, IMHO.
Go to the top of the page
 
+Quote Post
Konsaki
post Mar 9 2007, 07:22 PM
Post #35


Runner
******

Group: Members
Posts: 2,526
Joined: 9-April 06
From: McGuire AFB, NJ
Member No.: 8,445



Whether consious or unconsious, a TM gets a chance to notice via rolling of the dice at a minimum. TM's also get a bonus to perceiving in the matrix due to their constant link with it through their brain. Since the action itself could be considered 'Illegal' by the controling node, the TM's Brain, the Spoofed Smartlink might not even get a chance to perform the datasearch in the first place.

When it comes down to it, anyone can go back and forth using the Matrix rules from RAW just because there is so much grey area. I'm just telling it how I would play this matrix scenario.
Go to the top of the page
 
+Quote Post

2 Pages V  < 1 2
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 12th April 2022 - 10:36 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.