Hacking using airwaves but no matrix, Getting into trouble in odd ways |
Hacking using airwaves but no matrix, Getting into trouble in odd ways |
Aug 9 2007, 12:08 PM
Post
#1
|
|
Running Target Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 |
The SR2 and SR3 rules had a provision for hacking in through cameras and such in a world where everything was wired. It made sense. With the world now being wireless, however, the validity of some methods of entry seem odd. Specifically, lets say two people have a commlink. These commlinks have some cyberware, some gear, and each other subscribed. There is no matrix connection.
An enemy hacker uses Sniffer to monitor the airwaves and detects their conversation. Not happy enough with jamming or listening in, the enemy hacker decides he'd like to put an agent on their commlink to record everything they do. Sprites with the Cookie power wouldn't work because when they have no matrix connection Sprites de-rez. Given this situation, do the two commlinks that lack a matrix connection on their subscription list have the ability to be hacked into merely by their transmissions to each other? |
|
|
Aug 9 2007, 12:14 PM
Post
#2
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
No, because Man-in-the-Middle attacks only have rules for wired connections.
|
|
|
Aug 9 2007, 12:20 PM
Post
#3
|
|
Dragon Group: Members Posts: 4,328 Joined: 28-November 05 From: Zuerich Member No.: 8,014 |
The logical consequence would be though that most people on both sides of the law would use such a connection to network, and connect to the matrix through a a heavily-guarded single node.
So, all members of a team would only be subscribed to each other, and their matrix link would be run through the hacker's main commlink, or even a remote-server placed in a vehicle or secure shelter, and choke-full of IC and agents, or even hackers. |
|
|
Aug 9 2007, 12:26 PM
Post
#4
|
|
Runner Group: Members Posts: 2,650 Joined: 21-July 07 Member No.: 12,328 |
I thought you totally could by sniffing their traffic, decrypting it, spoofing yourself as one of the items subscribed then hacking yourself into a node from there?
|
|
|
Aug 9 2007, 01:08 PM
Post
#5
|
|
Running Target Group: Members Posts: 1,246 Joined: 8-June 07 Member No.: 11,869 |
Quick FYI: You don't need to be subscribed to communicate via commlink. That's considered normal use of the device. The only reason someone would need to subscribe to your commlink is if they needed User level or higher functions to manage the device. For example, your secretary would need to subscribe to your commlink and be given User access to manage appointments on your calendar. You might want to give her Security access to screen calls and route messaging. You would have Admin access to add/remove/modify accounts, turn off the firewall, turn the device on/off, etc.
Also, there aren't any rules for turning off subscription, but you can turn off wireless. Your commlink is almost a total waste at that point except where you can connect it to the matrix via skinlink/jack. |
|
|
Aug 9 2007, 01:17 PM
Post
#6
|
|||
Runner Group: Members Posts: 2,650 Joined: 21-July 07 Member No.: 12,328 |
Couldn't you set a device to only transact with subscribed devices, hence spoof? This is even vaguely refered to in the PAN modes section under Passive. Also under the spoofing your comm code bit too. |
||
|
|||
Aug 9 2007, 02:54 PM
Post
#7
|
|
Running Target Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 |
Subscribing bypasses the fact the runners have their commlinks running in Hidden mode.
|
|
|
Aug 9 2007, 03:08 PM
Post
#8
|
|||
Shooting Target Group: Members Posts: 1,706 Joined: 30-June 06 From: Fort Wayne, IN Member No.: 8,814 |
I just want to oppose this. I thought that given the above example, with the two, non-matrix connected commlinks, as long as you were within signal range, and had a strong enough signal range yourself, you would follow normal hacking rules, thus acting similar to a wired connection. In this case, the air is your wire, and none of it requires matrix access... |
||
|
|||
Aug 9 2007, 03:13 PM
Post
#9
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Though so, too... but the actual rules for Sniffer on wired and wireless are different.
|
|
|
Aug 9 2007, 03:22 PM
Post
#10
|
|||
Shooting Target Group: Members Posts: 1,706 Joined: 30-June 06 From: Fort Wayne, IN Member No.: 8,814 |
I just looked this up and yes, Sniffer rules are different between wired and wireless, but you can still hack in the above example as long as everyone is within Signal range. So, man-in-the-middle attacks don't require matrix connectivity...unless you have a special definition to man-in-the-middle attacks... |
||
|
|||
Aug 9 2007, 03:34 PM
Post
#11
|
|
Moving Target Group: Members Posts: 695 Joined: 2-January 07 From: He has here a minute ago... Member No.: 10,514 |
I thought the rules were pretty clear. They only talk about one level of communication between devices, and that's matrix level. There's more traffic going back and forth and the commlinks are not acting as walkie talkies. If you had a couple of simple radios it would be different, but these are two devices made to setup and share a matrix connection between themselves.
In short, yes, you could sniff and exploit and load an agent onto the commlinks, but you would have to exploit each one individually. |
|
|
Aug 9 2007, 03:42 PM
Post
#12
|
|
Runner Group: Members Posts: 3,009 Joined: 25-September 06 From: Paris, France Member No.: 9,466 |
To answer the opening question:
yes, commlinks can connect to the Matrix but can also create ad-hoc network (network between machines without a central access point). You can do the same with Wifi today: you can connect your computer to the internet (or a local network) by connecting to an Access Point but you can also connect directly to another wifi computer (or device). You can even have 3 computer form a network together this way. So you can have a hacker inserting himself in the ad-hoc local network created by two commlinks. |
|
|
Aug 9 2007, 04:52 PM
Post
#13
|
|
Moving Target Group: Members Posts: 695 Joined: 2-January 07 From: He has here a minute ago... Member No.: 10,514 |
Blade is right, but it should be noted that the default connection type for the wireless martix is ad hoc. They do talk so much about the meshing, don't they ;)
|
|
|
Aug 9 2007, 06:12 PM
Post
#14
|
|
Shooting Target Group: Members Posts: 1,706 Joined: 30-June 06 From: Fort Wayne, IN Member No.: 8,814 |
Looking at page 225 (Intercepting Wireless Signals), I think gives me a slightly different angle than I earlier stated. And really, it comes down to defining what the OP meant by hacking.
Per RAW, you can listen in, edit, block, etc the traffic between the two devices...but, it looks like you wouldn't be able to upload an agent or access the subcription list. You could spoof the other device and if they receving node accepts the request to upload the agent, I suppose you could do that, but it wouldn't be like "Hacking on the Fly" and accessing the device. So I retract my previous thoughts on my initial response...I still consider this hacking, but you are obviously limited on what you can do, based on RAW. |
|
|
Aug 9 2007, 06:44 PM
Post
#15
|
|
Running Target Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 |
Excellent perspectives... thanks everyone!
|
|
|
Aug 9 2007, 07:44 PM
Post
#16
|
|
Moving Target Group: Members Posts: 695 Joined: 2-January 07 From: He has here a minute ago... Member No.: 10,514 |
...
Holy crap... do we have a consensus? |
|
|
Aug 9 2007, 07:50 PM
Post
#17
|
|
Running Target Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 |
Sssshh, otakusensei... you'll jinx it!!!!
:-) |
|
|
Aug 10 2007, 08:12 AM
Post
#18
|
|||
Runner Group: Members Posts: 3,009 Joined: 25-September 06 From: Paris, France Member No.: 9,466 |
Yes that's why you can do with the wireless signals. But nothing prevents you from connecting your commlink to one of the other commlink in range of both signals. Then it's standard hacking : discover the node, connect to it, decrypt, exploit and you're in. If you've got only one guy with a commlink with no connection to the Matrix but with his wireless emitter still on, you can still connect to his commlink, right? Adding another commlink and a connection between the two don't change anything about it. |
||
|
|||
Aug 10 2007, 09:01 AM
Post
#19
|
|
Immortal Elf Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
one point worth noting is that, at least as far as i can tell, if your node's wireless capabilities are not actually turned off, and you're in range of a node with a Matrix connection, you are connected to the Matrix whether you like it or not. you can't unsubscribe from the Matrix.
|
|
|
Aug 10 2007, 09:43 AM
Post
#20
|
|||
Runner Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
Well, yes they can. They can choose not to connect to the Node. You dont connect to the matrix automatically, you must connect to a node that in turn is conencted to the matrix. So, you can have your Wi/Fi on and NOT be on the matrix. |
||
|
|||
Aug 10 2007, 10:06 AM
Post
#21
|
|||
Moving Target Group: Members Posts: 107 Joined: 21-December 06 Member No.: 10,413 |
As long as the commlink your trying to is set to accept connections, if its run in hidden mode its set to only accept a specific set of connections. ( This is where wireless intercepts are handy as you can potentially ease drop on subscriptions on the air.) |
||
|
|||
Aug 10 2007, 11:53 AM
Post
#22
|
|
Runner Group: Members Posts: 3,009 Joined: 25-September 06 From: Paris, France Member No.: 9,466 |
I guess that connecting even if your connection is not supposed to be accepted is all part of the high treshold for finding the hidden node and also part of the exploit process (which, according to the FAQ includes the subscription to the node).
|
|
|
Lo-Fi Version | Time is now: 27th January 2025 - 03:46 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.