IPB

Welcome Guest ( Log In | Register )

3 Pages V   1 2 3 >  
Reply to this topicStart new topic
> hacking hacking hacking, can we keep the hackers out?
dog_xinu
post Dec 18 2007, 05:53 PM
Post #1


Moving Target
**

Group: Members
Posts: 289
Joined: 20-February 04
From: in the matrix
Member No.: 6,091




I might have missed something in the hacking rules, so if I have please forgive me.

It seems next to impossible to keep a hacker (or TM) out of a computer. From commlink, to cash register to Lone Star's Mainframe for Seattle.. As long as it is a hacker and not someone deciding to hack, they are throwing at least 15 dice for hacking test (and I have had characters thrown 20++), that is 5+ hits vs the "computer". Well d**m! they are going to get in. It might take a few IPs to do so but you cant stop them. You can only hope they glitch (or even better critical glitch) so you can set off an alarm.

I have been putting up wireless paint around places that have semi-secure data (or better) but that doesnt stop the hacker but just slows them down.

Am I missing something or what do you recommend?

dog
Go to the top of the page
 
+Quote Post
Tarantula
post Dec 18 2007, 06:04 PM
Post #2


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



At best, a regular hacker can pull 6 (program) + 7 (hacking w/aptitude) + 2 (specialization) + 2 (codeslinger) +2 (VR) + 2 (lvl 2 encephalon) = 21 dice. That is the absolute limit of their hacking abilities. And this is with 20 BP spent on making it their thing.

It is virtually impossible to keep hackers out of a system. Keep it without wireless, so they have to go in with the team. Put some IC in it with analyze. (System 6, Firewall 6 w/ IC 6 w/ analyze 6) this makes the hacker hack in with threshold 6, and the node is trying to spot you with 12 dice. Since the best stealth program in the game is rating 6, then, let the node buy hits at 4 dice = 1 hit. That means if they can't hack through in 2 shots, the node detects them.

If they do get in, the IC gets a chance to spot them with its 12 dice vs stealth program. Give the IC more attempts anytime they do something that isn't allowed with their access rating. (Such as a user rating hack trying to look at the security cameras, the hacker can do it via hacking skill, but give the IC another shot to see through the stealth).
Go to the top of the page
 
+Quote Post
Moon-Hawk
post Dec 18 2007, 06:08 PM
Post #3


Genuine Artificial Intelligence
********

Group: Members
Posts: 4,019
Joined: 12-June 03
Member No.: 4,715



Don't forget many devices will require no less than Admin access to do anything useful, thus +6 threshold to hack in.
Not that that changes much, they'll still get in eventually.
Go to the top of the page
 
+Quote Post
Kyoto Kid
post Dec 18 2007, 06:15 PM
Post #4


Bushido Cowgirl
*********

Group: Members
Posts: 5,782
Joined: 8-July 05
From: On the Double K Ranch a half day's ride out of Phlogiston Flats
Member No.: 7,490



...shooting the hacker? :grinbig:

Seriously, there are a few alternate houserule variants floating around. The most widely accepted is the Skill + Logic hits capped by Programme Rating. This forces many matrix ops to become extended tests which first, take more time and second, increase the chance of the system noticing something is up as each interval allows the system to make another detection test (at least the way we run it). We also use the skill rating as the cap for how many rolls a character gets in an extended test.

Also [as mentioned in the response above] there is the level of access the MS desires. This changes the required threshold. Make sure that the player mentions what level of access he or she wants before rolling.

Of course the main thing is having IC. Even if it is not killer, it can slow the intruder down as well as send an alert if it is crashed. In our group, we use the old rule that if the MS defeats an IC construct, she can opt to withhold 1 die from her pool to suppress it. Several IC encounters and then it becomes a challenge as the DP is reduced further. Also programme load is another thing to watch for. If the MS goes in with more active programmes than commlink Response/System rating, all her programmes operate at one level lower so now her utilities including stealth & spoof can become easier to overcome.
Go to the top of the page
 
+Quote Post
DireRadiant
post Dec 18 2007, 06:38 PM
Post #5


The Dragon Never Sleeps
*********

Group: Admin
Posts: 6,924
Joined: 1-September 05
Member No.: 7,667



It's a bit tricky to follow, but the opposition to Hacking is not in the initial hacking test. The Hacker gets the extended test and the system gets it's test to detect the attempt. The odds are likely the Hacker will succeed.

So it seems so easy. Why yes it is.

But look at p. 222 Hacked! - Once Inside, and Intruder Alerts.

Once the Hacker has gained access, it is up to the GM to decide if and how there is IC and what will happen.

Up to the GM to be creative or choose what opposition there is. There are some examples to follow and a description of some cases and standard routines, but it's up to the GM to figure out what happens.

Compare this to the character that pulls out a gun and shoots a random someone in the street. They roll agility + Gun and they hit! Wow, it's so easy, they shot someone, how do I stop them from shooting people? Well, D'uh, the GM concludes that Lone Star will show up, or the person shot shoots back, or whatever. Whatever is fun for the story.

You want Hacking to be a simple die roll that succeeds most of the time, then don't have IC.

You want to have the Hacker have a challenge, then give them a challenge.

The only limit is your imagination.
Go to the top of the page
 
+Quote Post
Kyoto Kid
post Dec 18 2007, 06:51 PM
Post #6


Bushido Cowgirl
*********

Group: Members
Posts: 5,782
Joined: 8-July 05
From: On the Double K Ranch a half day's ride out of Phlogiston Flats
Member No.: 7,490



...@DR, good points. Indeed the only way to really make it a challenge is that you the GM have to put some work into it if you don't want the Matrix Specialist on the team just waltzing through. Yes it can be a bit more daunting than just whipping up a few sec guards, some Lonestar cops, or a gunbunny or two as IC constructs can be loaded with various utilities just like Agents.

Databombs are always a good and simple option. The MS has to successfully defuse the bomb. If not, her icon not only takes damage but the data is destroyed as well.

But yes, the bottom line is imagination (and a bit of work). For example, In my last run of RiS I creeped out the Decker (and player) so badly that he jacked out before encountering any of the really bad IC waiting for the character. This was done just by description of the sculpting. Suspense can be the best weapon in your arsenal of tricks if you know how to build it up.
Go to the top of the page
 
+Quote Post
Exodus
post Dec 18 2007, 07:51 PM
Post #7


Target
*

Group: Members
Posts: 71
Joined: 29-July 06
From: Orlando, FL
Member No.: 8,981



QUOTE (Moon-Hawk)
Don't forget many devices will require no less than Admin access to do anything useful, thus +6 threshold to hack in.
Not that that changes much, they'll still get in eventually.

now i'm missing something, where does that +6 come from? Page number if possible so I can read up on it please.
Go to the top of the page
 
+Quote Post
Stahlseele
post Dec 18 2007, 08:00 PM
Post #8


The ShadowComedian
**********

Group: Dumpshocked
Posts: 14,538
Joined: 3-October 07
From: Hamburg, AGS
Member No.: 13,525



probably meant to write 6+ and just switched the plus and the six around
Go to the top of the page
 
+Quote Post
Moon-Hawk
post Dec 18 2007, 08:01 PM
Post #9


Genuine Artificial Intelligence
********

Group: Members
Posts: 4,019
Joined: 12-June 03
Member No.: 4,715



QUOTE (Exodus)
QUOTE (Moon-Hawk @ Dec 18 2007, 02:08 PM)
Don't forget many devices will require no less than Admin access to do anything useful, thus +6 threshold to hack in.
Not that that changes much, they'll still get in eventually.

now i'm missing something, where does that +6 come from? Page number if possible so I can read up on it please.

QUOTE (SR4 pg 216)
Note that standard electronic devices only have admin accounts, as there is no need for other accounts for their software.

The GM may, or may not, consider this to include commlinks.
Go to the top of the page
 
+Quote Post
Fortune
post Dec 18 2007, 08:05 PM
Post #10


Immoral Elf
**********

Group: Members
Posts: 15,247
Joined: 29-March 02
From: Grimy Pete's Bar & Laundromat
Member No.: 2,486



QUOTE (Exodus @ Dec 19 2007, 05:51 AM)
now i'm missing something, where does that +6 come from?  Page number if possible so I can read up on it please.

Information on the different types of Accounts is on page 216 of the SR4 Core rulebook. Details about hacking into, or creating each of these Accounts is on page 221 of the same book.
Go to the top of the page
 
+Quote Post
Aaron
post Dec 18 2007, 08:17 PM
Post #11


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



EDIT: Sorry, nothing to see here.

ANOTHER EDIT: I can say that I believe that the "can't be immune to hacking" thing is intentional. Much the same way that things "can't be immune to magic" and "can't be immune to bullets/explosives/etc." There's always a way past defenses; it's true in Real Life, too. This is why there are guards and security magicians and spiders.

When I was playing a hacker, I would completely own any node I wanted, but I learned real quick to back the hell off if there was a spider in the node.
Go to the top of the page
 
+Quote Post
dog_xinu
post Dec 18 2007, 10:34 PM
Post #12


Moving Target
**

Group: Members
Posts: 289
Joined: 20-February 04
From: in the matrix
Member No.: 6,091



QUOTE
There's always a way past defenses; it's true in Real Life, too.


true but in RL there are some very simple things I can do to make it very very very difficult. I work for a financial company. To get anywhere near our computers in physical form (not that is what I was talking about), you have to get to the right facility (which is not marked) with guard, man-traps, etc then you have to have the right badge/access code to get to the room. Can it be done, yet but not easily done. On the software side we have very similar things. It is a mother-f*n pain in the butt to get anything from the "inside" out. And I work there and know the environment. If I didnt it would be next to impossible to do in a timely manor.

Granted that if someone spend time (like a year) studying our systems from the outside then they might have a chance. BUT every time they tried to get in and it failed (they did not get the correct number of successes in the first attempt), our system would shutdown for them (IE not talk to that IP address anymore). Which makes it harder. And on top of that.. we are always upgrading/changing/modifying our systems so the data you learn in month 1 may or may not be helpful in month 4.

so for a hacker (or TM) to fire up their "deck" aka comlink, and run some progs/do "some magic" and are in within lets say 2 CRs (should be much less than that - more like 2 IPs), it is difficult for me to grasp. Now the hacker sitting in the local pizza parlor and hacks the cash register for some :nuyen: and it takes them less than a CR.. ok.. this is a game and they are the elite of the elite. cool. Hacking into Billy Bob's Bait Shack and Towing Service (or other Mom/Pop shop), shouldnt take long either. But into your Ares, Renraku, MCT, Coke, Pepsi, DMV, McDonalds, etc (yeah I mixed 2007's and 2070's companies!) should be a PITA (pain in the ****).

QUOTE
EDIT: Sorry, nothing to see here.


I loved seeing this. Sorta like ObiWan saying "these are not the droids you are looking for ..."


I guess I really need to wait for "UnWired" (or whatever the name of the book will be) to really get my answers...


thanks!!
Go to the top of the page
 
+Quote Post
FrankTrollman
post Dec 18 2007, 11:38 PM
Post #13


Prime Runner
*******

Group: Banned
Posts: 3,732
Joined: 1-September 05
From: Prague, Czech Republic
Member No.: 7,665



Hacking is way more dumb than that, honestly.

Yes. If your computer is connected to the interwebs at all then people can hack them.

Yes. If someone can hack your computer they will succeed in doing so. Like pretty much instantaneously.

If you expose your brain to the interwebs at all, you're dead. Like, yesterday. It doesn't really matter whether you're Fastjack or Dodger, the black IC rules are so gratuitously deadly that you will die. Probably in one round.

But you don't have to expose your brain to the interwebs. Also you don't have to expose any of your devices to the interwebs. There's no enforcement mechanism for any of this.

---

So yeah. Under the basic rules the acting player always wins in hacking. The hacker hacks into the system. The Black IC kills the hacker. All the die rolling is just a formality.

But because it's so deadly, and because nothing actually happens to you if you opt out, everyone opts out. You just set your devices to not accept incoming signals from hostile devices because you can fucking do that and you just run all your computer operations in AR. It's a problem hich solves itself.

Final analysis is that the Hacker would be unstoppable, but there's literally no reason for his abilities to ever be usable. It's like if Mages were completely unstoppable but people could stop them entirely just by stating at the beginning of the session that you'd prefer to not have spells cast on you.

Shameless Plug

-Frank
Go to the top of the page
 
+Quote Post
Cthulhudreams
post Dec 19 2007, 12:13 AM
Post #14


Runner
******

Group: Members
Posts: 2,650
Joined: 21-July 07
Member No.: 12,328



In the shadowrun world as written, everyone is kept out of devices because they all come with a handy on-off switch for wireless that is turned to 'off' by any player. GM opponents often also indulge in the off switch while defending secure compounds and other such things.

This makes you, as a player, immune to hacking relatively easily as frank points out. GM's usually manage this with a blend of 'secure' systems with no wireless and 'unsecure' systems with wireless tat the hacker can do cool stuff with, but its all strikingly silly.

i'm playing in a game with franks rules atm and i'm rather impressed actually - the infomational powers work quite well, and the attack powers are not as good as feared, but you do need signal defense. Ironically a death note and manaball did much the same thing, though the manaball was more effective.
Go to the top of the page
 
+Quote Post
Aaron
post Dec 19 2007, 04:41 AM
Post #15


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (dog_xinu @ Dec 18 2007, 05:34 PM)
so for a hacker (or TM) to fire up their "deck" aka comlink, and run some progs/do "some magic" and are in within lets say 2 CRs (should be much less than that - more like 2 IPs), it is difficult for me to grasp.  Now the hacker sitting in the local pizza parlor and hacks the cash register for some :nuyen: and it takes them less than a CR.. ok.. this is a game and they are the elite of the elite.  cool.  Hacking into Billy Bob's Bait Shack and Towing Service (or other Mom/Pop shop), shouldnt take long either.  But into your Ares, Renraku, MCT, Coke, Pepsi, DMV, McDonalds, etc (yeah I mixed 2007's and 2070's companies!) should be a PITA (pain in the ****).

Well, hacking on the fly is kinda loud. It's analogous to picking a lock, breaking down a door, or blasting through a ward: if anybody's paying attention, they'll notice. I betcha I can get at the computers at your financial institution by driving a tank through a wall or three and gassing all the people, but I imagine I'd be noticed.

QUOTE (dog_xinu)
I loved seeing this. Sorta like ObiWan saying "these are not the droids you are looking for ..."


I guess I really need to wait for "UnWired" (or whatever the name of the book will be) to really get my answers...

Yeah, sorry about that. My first impulse is to be helpful, but then I remember that some of my opinions infringe a bit on some of my agreements, usually after I hit Submit. I should probably stop posting entirely, really.
Go to the top of the page
 
+Quote Post
kzt
post Dec 19 2007, 05:40 AM
Post #16


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



Also, things are not nearly as secure as he imagines they are. Nobody is unless they have a complete air gap on their network, and it's hard for people at home to do their banking on-line if the banks servers are air-gapped from the internet.

'the biggest problem he sees in industry is the feeling that "we don't think it [breaches] can happen to us,", he said, "but it's happening every day."'

'"We are well past the $5 billion per year mark, and I don't know where the top end is," commented one STRATCOM official. "The $5 billion is mostly on defense. We buy huge amounts of software and people to run that, but it's totally ineffective against Tier III" cyber [advanced persistent] threats, this official noted.'
Go to the top of the page
 
+Quote Post
deek
post Dec 19 2007, 01:58 PM
Post #17


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



QUOTE (FrankTrollman)
So yeah. Under the basic rules the acting player always wins in hacking. The hacker hacks into the system. The Black IC kills the hacker. All the die rolling is just a formality.

But because it's so deadly, and because nothing actually happens to you if you opt out, everyone opts out. You just set your devices to not accept incoming signals from hostile devices because you can fucking do that and you just run all your computer operations in AR. It's a problem hich solves itself.

I have to agree and disagree with this first part. I agree that a hacker always "wins", meaning I have never seen a hacker have a problem getting into a system. Whether it is admin or user access, an average hacker will always get into the system (even using skill and extended test caps). Its just never a problem.

But, I don't agree with Black IC always killing the hacker. I've run a decent amount of matrix runs and what we always come back to, even with multiple IC against a single hacker, is a stalemate. The hacker doesn't really ever do enough damage to crash the IC, and the IC really never does enough damage to dumpshock the hacker. My experience has been that the best I can normally hope for (as a GM) is to bore the hacker to frustration where he wants to just leave, or lock his connection long enough to trace and get physical security at his location and/or call in backup, like a spider.

I suppose, if we go to extremes, which is maybe what you are talking about, that after 40 or 50 IPs, the Black IC is going to "win", by knocking the hacker out...and they yeah, it is just a formality.

And I still maintain, that opting out does mean something, as everyone else gets more dice from AR bonus...an extra 1 to 3 dice helps out a bit...and I don't see how you could not accept all incoming signals, yet still be in AR...you need to get a signal from something to use it, and by using it, you are open to be spoofed...
Go to the top of the page
 
+Quote Post
Nightwalker450
post Dec 19 2007, 02:31 PM
Post #18


Moving Target
**

Group: Members
Posts: 698
Joined: 26-October 06
From: Iowa, United States
Member No.: 9,720



You can still do AR through hard lines and skin links. But it would only be via those that are part of your immediate person (unless you bring long cords to run between every member of your team...) So this would handle smart link guns, AR driving (put the skinlink on the steering wheel), and other similar things but you wouldn't be able to get camera images or map overlays or any other such thing provided by another member of your team.
Go to the top of the page
 
+Quote Post
deek
post Dec 19 2007, 02:53 PM
Post #19


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



Nor would you see the myriad of AROs that are all about the area...and it think that is the main area that you are getting a bulk of the bonus.
Go to the top of the page
 
+Quote Post
Cheops
post Dec 19 2007, 03:57 PM
Post #20


Shooting Target
****

Group: Members
Posts: 1,512
Joined: 26-February 02
Member No.: 392



Opting out in RL is rapidly becoming a near impossibility and I imagine that in a future where you can live in whatever virtual world you want to it'd be even harder to opt out of that technology.

I dare you Frank, to spend 1 week without using the Internet AT ALL.

Tell me how useful you were and how satisfied you are after that.

There are so many tricks that you can use that it is daunting. Password levels are a good way to do this. Not every user has access to the security cameras. Passkeys are another great way since you have to get your hands on one before you can even try to hack.

Track is possibly the best deterrent to hackers. My PCs hate it when they are hacking and I say that the IC runs up to them yells "Tag! You're it!" and runs off. Now they're on the clock. This gets even funnier if a Black IC jams open their link. Also keep in mind that jacking out doesn't instantly wipe out their datatrail so if the IC can track fast enough it can still narrow down their location. That's when the corp shadow team starts to hack its way into gridguide etc to track you physically.

Edit: also please note that Track only requires MLOS now not even a matrix attack. I just like to see the look of panic on the hacker's face when they know they are being tracked. A more sadistic GM doesn't even have to let the PC know that they are being tracked and could potentially have surveillance on the hacker before the hack is completed.
Go to the top of the page
 
+Quote Post
Ryu
post Dec 19 2007, 04:22 PM
Post #21


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



Why should a corp NOT run its network if Black IC is guranteed to win everytime? Why wouldn´t there be services that provide roaming Black IC to all loyal corp citizens? Why wouldn´t you trust your corp, your loving family, not to kill you because they can?

Answer: The corp will run the network and everybody will use the matrix.

Problem: The black IC won´t win all the time, and hackers will succeed. Problem for the target, that is. The corp will rather drop dead than admit the problem.


Now should there be easy ways to keep hackers out? In my opinion, the scale should go a bit further on the hard side. One first step may indeed be to use skill+attribute instead of equipment+skill, as now you have to learn.
If you use ratings as thresholds, not just anyone is going to reliably beat a system 3 all of a sudden. Script kiddies are kept out, and serious phone service provider strike teams take care of attacks against the general populace. Minor hacking attempts are handled by your matrix security provider, usually LoneStar.
Go to the top of the page
 
+Quote Post
Aaron
post Dec 19 2007, 04:27 PM
Post #22


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



Regarding black IC v. intruders, when I was playing a hacker, my program loadout was configured for stealth and intrusion when I got into a node, not for combat. That skewed a lot of results toward any black IC in the node.
Go to the top of the page
 
+Quote Post
Kyoto Kid
post Dec 19 2007, 05:21 PM
Post #23


Bushido Cowgirl
*********

Group: Members
Posts: 5,782
Joined: 8-July 05
From: On the Double K Ranch a half day's ride out of Phlogiston Flats
Member No.: 7,490



...Ryu, I like your thinking. I am currently playing a Matrix Specialist under a new (as in "green" GM) and have been schooling him on how to make the Matrix tougher. The last couple of runs were pretty much cakewalks even though we do use the Attribute + Skill capped by Programme rating rule. I like the idea of the system's rating being a threshold however how this is applied is another matter.

Since pretty much every matrix test becomes an extended test under the Skill + Attribute houserule (save for cybercombat), this would make it tougher. However, should the threshold be applied against the total number of hits in each roll, or the number of hits allowed by the programme rating cap?
Go to the top of the page
 
+Quote Post
Whipstitch
post Dec 19 2007, 05:24 PM
Post #24


Runner
******

Group: Members
Posts: 2,883
Joined: 16-December 06
Member No.: 10,386



QUOTE (Cheops @ Dec 19 2007, 10:57 AM)
I dare you Frank, to spend 1 week without using the Internet AT ALL.

I see what you're trying to say, but just about all of us have spent a signficant chunk of our lives without the internet. I mean, my family was a bit ahead of the curve and all but I was still 12 years old before I started getting into BBSes and then the internet, and I'm only 25. And honestly? Bt the RAW it's not hard to opt out of the wireless world when you're doing anything that's actually important. Swap fake sins regularly and keep a rotating cast of cheap commlinks (Metalinks are CHEAP and you can also modify hardware to give bogus codes via a Hardware check) that you use only for identification and day-to-day expenses and you're golden. I mean, really, if you're using an entirely new commlink on a regular basis, what are people going to find out about you? That your last Fake Identity likes to order soyburgers with no pickle but extra onions? Besides, when it comes to actually breaking into a facility there's really only three routes anyway: Keeping your commlink on Public Mode because you're bullshitting your way in (at which point your credentials rather than your commlink is the real weakpoint), keeping it on hidden or keeping it turned off. For businesses, it's obviously a more complicated issue, but not by much; important things can still be stored on secure wired systems and the "answer" to the hacking problem remains shooting everyone in the face.
Go to the top of the page
 
+Quote Post
kzt
post Dec 19 2007, 05:34 PM
Post #25


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



QUOTE (Cheops)
That's when the corp shadow team starts to hack its way into gridguide etc to track you physically.

What makes you think that they need to start to hack their way into it? They do this for a living. I'd assume they have an existing back door or have made arrangements so they have a legitimate account. They can just immediately login with the rights to track you.
Go to the top of the page
 
+Quote Post

3 Pages V   1 2 3 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 26th April 2024 - 07:37 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.