IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Redirecting Comms
Abbandon
post Mar 18 2008, 03:24 PM
Post #1


Shooting Target
****

Group: Members
Posts: 1,711
Joined: 15-June 06
Member No.: 8,716



Isnt there/shouldnt there be a way to totally redirect the end point of a communication? It happens all the time in the movies where the bad guys trys to call somebody and he ends up talking to the hacker instead. Now sure you can intercept those calls and even block and insert stuff but that will most likely cause a whole hell of a lot of suspician.

Go to the top of the page
 
+Quote Post
Nightwalker450
post Mar 18 2008, 03:28 PM
Post #2


Moving Target
**

Group: Members
Posts: 698
Joined: 26-October 06
From: Iowa, United States
Member No.: 9,720



Could probably do a single Spoof to redirect when the call comes through. (Extended) Threshold based on firewall of the calling party. If you can get it in one pass, then the call never goes through, if you can get it in a single turn, then the receiver won't have time to answer unless he was running VR as well. Longer than that you'll be interrupting the call. (IMG:style_emoticons/default/biggrin.gif)
Go to the top of the page
 
+Quote Post
deek
post Mar 18 2008, 03:32 PM
Post #3


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



I'd allow this, but the hack would need to be done up front, not on the fly. If the hacker sets up the opponents comm to redirect outbound/inbound calls, then I'd let him do it, but it may take some time.
Go to the top of the page
 
+Quote Post
Prime Mover
post Mar 18 2008, 03:34 PM
Post #4


Shooting Target
****

Group: Dumpshocked
Posts: 1,755
Joined: 5-September 06
From: UCAS
Member No.: 9,313



It would really depend on were your trying to redirect it from and how say a comm is connecting to the node its communicating with. If comm is sending to a 3rd party tower before reaching node its communicating with then sure why not. If its a comm to comm connection you'd have to hack either the sender or the receiver.
Go to the top of the page
 
+Quote Post
Heath Robinson
post Mar 18 2008, 04:40 PM
Post #5


Running Target
***

Group: Members
Posts: 1,263
Joined: 4-March 08
From: Blighty
Member No.: 15,736



There are two basic ways to handle this but their implementations can vary depending on how invasive and how quickly you need to pull this off. Whilst I know little about the actual system for handling communications over the wireless matrix in SR4 (and I don't think a technical specification has been published), I can provide methods that should work based on sensible assumptions about how it should work.

The first way is to trick the transmission to terminate at your commlink by spoofing the intended destination and by dint of being closer to the sender than the actual recipient. The second is to get the recipient to relay it to your commlink instead of letting the user see it. These are not mutually exclusive.

Depending on how many assets you have lying around, you can deploy a number of spoofers and relay any intercepted communications to your commlink of choice. You could instead push a "patch" to the target's commlink that asks you if you want to relay an incoming call to a commlink of your choice, with caller ID, dynamic redirection and everything! You can shadow the endpoint and rely on faster repsonse or better signal to spoof the call instead. The worst choice is just to rely on spoofing his commlink and hope the call catches you first, but sometimes you don't have the skills or gear to make use of a better choice. One way to guarantee you'll get his calls is to prevent the commlink you're spoofing from receiving any signals whatsoever by frying the aerial or jamming it temporarily.

The way to think about the system is that it basically negotiates a path to the terminus by asking all the nodes nearby if they happen to know where a particular commlink is; they'll look up the commlink's network identifier/address in their routing table and respond to indicate that it has information of a particular recency and with a certain degree of seperation from the target. The transmitter/relayer will determine which has the most up to date information or least number of "hops" (or relays) to reach the intended destination and send it to them. This is done for each small part of the stream that contains the audio, though most nodes will keep recently used routing table fragments in their caches to expedite streaming. Spoofing the terminus means you'll identify yourself as the endpoint and get routed the call instead of the real one, you need to be "closer" or at least better connected than the real endpoint or else it'll get to it anyway because it'll be the faster choice. If you're near to the intended endpoint, you'll have to respond before it and request encrypted transport using one of your keys to ensure that it can't also receive the stream, though it might note that it was being spoofed and flash a warning.

Note: Intercepting is a different kind of attack on the system that would allow you to bug the call but not take the call instead of him.

Disclaimer: This is all based on my education in Comp Sci, the actual game terms and mechanics used for these attacks may be different.
Go to the top of the page
 
+Quote Post
kzt
post Mar 18 2008, 05:37 PM
Post #6


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



And the best part is that thanks to the wonders of the edit program and decrypt there is no way to tell that they are not talking to the party their thought they called. So is that your fixer calling, or the Star?
Go to the top of the page
 
+Quote Post
kanislatrans
post Mar 18 2008, 06:23 PM
Post #7


Moving Target
**

Group: Members
Posts: 602
Joined: 2-December 07
From: The corner of Detonation Boulevard and Fascination Street
Member No.: 14,464



I always assume communications are being intercepted. so I randomly make phone calls to random numbers and speak in nonsence code like" Hello, the brown bear likes his ravioli cold" and then hang up. that way any one listening has to wade through all the useless stuff to get my real calls. ( have I mentioned I'm really, really paranoid?) (IMG:style_emoticons/default/wobble.gif) (IMG:style_emoticons/default/wobble.gif)
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 20th July 2024 - 06:04 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.