IPB

Welcome Guest ( Log In | Register )

58 Pages V  « < 16 17 18 19 20 > »   
Reply to this topicStart new topic
> OOC: Phoenix Rising, Out of Character thread for the runners
Fuchs
post Sep 22 2008, 07:37 PM
Post #426


Dragon
********

Group: Members
Posts: 4,328
Joined: 28-November 05
From: Zuerich
Member No.: 8,014



Yes, 14d6 is hacking and exploit, the electronic warfare and scan was the "scanning for hidden nodes" in the first spoiler.
Go to the top of the page
 
+Quote Post
Little Johnson
post Sep 22 2008, 07:38 PM
Post #427


Moving Target
**

Group: Members
Posts: 199
Joined: 18-August 08
Member No.: 16,250



If hitting her while shes still in the water would neutrelize the fire elementel then we should take that into concideration.

makes a hit from either bank more appealing.and or swamping her with drone fire and a waterelemental to pull all the peices to the botum .
Go to the top of the page
 
+Quote Post
DWC
post Sep 22 2008, 07:46 PM
Post #428


Shooting Target
****

Group: Members
Posts: 1,973
Joined: 3-October 07
From: Fairfax, VA
Member No.: 13,526



Crizh: It's actually probably going to make the attack on her commlink harder. Generally, you'd slave a commlink to something more secure so that anyone who wants to hack it has to hack the master node. Unless her commlink isn't slaved during the day, DD's about to find out how secure the master node is.
Go to the top of the page
 
+Quote Post
Shalimar
post Sep 22 2008, 07:48 PM
Post #429


Moving Target
**

Group: Members
Posts: 661
Joined: 23-March 03
Member No.: 4,322



QUOTE (Little Johnson @ Sep 22 2008, 03:38 PM) *
If hitting her while shes still in the water would neutrelize the fire elementel then we should take that into concideration.

makes a hit from either bank more appealing.and or swamping her with drone fire and a waterelemental to pull all the peices to the botum .



Fire Elementals are severely allergic to water (Water Elementals are alergic to fire). So attacking in the middle of the water can't be good for the thing.
Go to the top of the page
 
+Quote Post
crizh
post Sep 22 2008, 07:51 PM
Post #430


Runner
******

Group: Members
Posts: 2,666
Joined: 29-February 08
From: Scotland
Member No.: 15,722



QUOTE (DWC @ Sep 22 2008, 08:46 PM) *
anyone who wants to hack it has to hack the master node.


Or spoof commands from the master node. If you have sufficient time to study the traffic you can learn the Master Node's AccessID.

From that point on you own the slave node.

Go to the top of the page
 
+Quote Post
Fuchs
post Sep 22 2008, 07:54 PM
Post #431


Dragon
********

Group: Members
Posts: 4,328
Joined: 28-November 05
From: Zuerich
Member No.: 8,014



Well, if the commlink in her head is not operating in wireless right now, then DD won't find it to hack it. Simple (IMG:style_emoticons/default/nyahnyah.gif)
Go to the top of the page
 
+Quote Post
crizh
post Sep 22 2008, 08:02 PM
Post #432


Runner
******

Group: Members
Posts: 2,666
Joined: 29-February 08
From: Scotland
Member No.: 15,722



QUOTE (Fuchs @ Sep 22 2008, 08:54 PM) *
Well, if the commlink in her head is not operating in wireless right now, then DD won't find it to hack it. Simple (IMG:style_emoticons/default/nyahnyah.gif)



It has to be, it's slaved to another remote node.

If you can analyse/decrypt the data-stream you can step into the middle pretending to be the Master.

You wouldn't even need to load up exploit...

You could create the back door you already posted rolls for and re-slave it to one of your own nodes and spoof a dummy node with her AccessID. Neither end would be aware of the "Man in the middle" until it was too late...
Go to the top of the page
 
+Quote Post
DWC
post Sep 22 2008, 08:03 PM
Post #433


Shooting Target
****

Group: Members
Posts: 1,973
Joined: 3-October 07
From: Fairfax, VA
Member No.: 13,526



It probably is, since it's most likely acting as a chokepoint to all her other cyberware. It's how all the PC hackers are set up. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
bmcoomes
post Sep 22 2008, 08:05 PM
Post #434


Moving Target
**

Group: Members
Posts: 651
Joined: 15-September 06
From: Ephrata, Wa
Member No.: 9,382



QUOTE (crizh @ Sep 22 2008, 03:02 PM) *
It has to be, it's slaved to another remote node.

If you can analyse/decrypt the data-stream you can step into the middle pretending to be the Master.

You wouldn't even need to load up exploit...

You could create the back door you already posted rolls for and re-slave it to one of your own nodes and spoof a dummy node with her AccessID. Neither end would be aware of the "Man in the middle" until it was too late...


Crizh: She was slaved to an other node last night not today. It's just her headware commlink standing all alone in the dark. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
DWC
post Sep 22 2008, 08:06 PM
Post #435


Shooting Target
****

Group: Members
Posts: 1,973
Joined: 3-October 07
From: Fairfax, VA
Member No.: 13,526



Oh, and by spoofing her AccessID, you can probably just walk unmolested through the building''s electronic security during the incursion, since the building would think the spoofing node is actually her.
Go to the top of the page
 
+Quote Post
Oenone
post Sep 22 2008, 08:09 PM
Post #436


Moving Target
**

Group: Members
Posts: 765
Joined: 27-July 08
From: England
Member No.: 16,167



QUOTE (Shalimar @ Sep 22 2008, 08:48 PM) *
Fire Elementals are severely allergic to water (Water Elementals are alergic to fire). So attacking in the middle of the water can't be good for the thing.


Hmm but can't elementals just fly? In which case it'll just float above the boat and torch things, staying well away from the actual water. Perhaps if someone has a spell / spirit power which controls water so we can soak it?

One thing we might want to consider is proof of death, something we can't actually be sure of if she's lost at sea. Which might in turn reduce the amount Johnson is willing to actually pay us.
Go to the top of the page
 
+Quote Post
crizh
post Sep 22 2008, 08:10 PM
Post #437


Runner
******

Group: Members
Posts: 2,666
Joined: 29-February 08
From: Scotland
Member No.: 15,722



QUOTE (bmcoomes @ Sep 22 2008, 09:05 PM) *
Crizh: She was slaved to an other node last night not today. It's just her headware commlink standing all alone in the dark. (IMG:style_emoticons/default/smile.gif)



Just to clarify, during her class her headware comm-link is wireless-dark?

In which case DD cannot, indeed, detect it at all.
Go to the top of the page
 
+Quote Post
DWC
post Sep 22 2008, 08:13 PM
Post #438


Shooting Target
****

Group: Members
Posts: 1,973
Joined: 3-October 07
From: Fairfax, VA
Member No.: 13,526



I think he meant it's not slaved to anything. Considering where she is and what she does, it's probably not even in Hidden Mode.
Go to the top of the page
 
+Quote Post
bmcoomes
post Sep 22 2008, 08:13 PM
Post #439


Moving Target
**

Group: Members
Posts: 651
Joined: 15-September 06
From: Ephrata, Wa
Member No.: 9,382



QUOTE (crizh @ Sep 22 2008, 03:10 PM) *
Just to clarify, during her class her headware comm-link is wireless-dark?

In which case DD cannot, indeed, detect it at all.


No, the last part was a joke. her commlink was in hidden mode but active.
I'd think it would be in hidden mode at the lest to keep students from playing with it.

Brent
Go to the top of the page
 
+Quote Post
DWC
post Sep 22 2008, 08:14 PM
Post #440


Shooting Target
****

Group: Members
Posts: 1,973
Joined: 3-October 07
From: Fairfax, VA
Member No.: 13,526



QUOTE (bmcoomes @ Sep 22 2008, 03:13 PM) *
No, the last part was a joke. her commlink was in hidden mode but active.


Neat. I figured she'd be Passive, since being Hidden is illegal in so many places.
Go to the top of the page
 
+Quote Post
bmcoomes
post Sep 22 2008, 08:16 PM
Post #441


Moving Target
**

Group: Members
Posts: 651
Joined: 15-September 06
From: Ephrata, Wa
Member No.: 9,382



it's her classroom, I'd really don't think she needs to broadcast her SIN in there.
Go to the top of the page
 
+Quote Post
crizh
post Sep 22 2008, 08:41 PM
Post #442


Runner
******

Group: Members
Posts: 2,666
Joined: 29-February 08
From: Scotland
Member No.: 15,722



In which case DD may, indeed have been able to hack into it and create a backdoor.

The access logs in particular would be of interest as they would give details of the node she slaves it to for work.
Go to the top of the page
 
+Quote Post
Fuchs
post Sep 22 2008, 09:44 PM
Post #443


Dragon
********

Group: Members
Posts: 4,328
Joined: 28-November 05
From: Zuerich
Member No.: 8,014



DD got detected, and the node shut off.
Go to the top of the page
 
+Quote Post
Fuchs
post Sep 22 2008, 10:56 PM
Post #444


Dragon
********

Group: Members
Posts: 4,328
Joined: 28-November 05
From: Zuerich
Member No.: 8,014



(I'd like some idea of what is expected of DD.)
Go to the top of the page
 
+Quote Post
Little Johnson
post Sep 23 2008, 05:47 AM
Post #445


Moving Target
**

Group: Members
Posts: 199
Joined: 18-August 08
Member No.: 16,250



Jake if there is no outside access wont any live network security be onsite too?

If theres a corp hacker youll have to face he will have to be onsite. That meens if we can locate him and remove him or his access then youll have less opposition. Not too savy on matrix stuff but id bet IC is better to deal with than a live persona.
Go to the top of the page
 
+Quote Post
Fuchs
post Sep 23 2008, 10:30 AM
Post #446


Dragon
********

Group: Members
Posts: 4,328
Joined: 28-November 05
From: Zuerich
Member No.: 8,014



I don't get why one would have to follow the access ID to the security node - wouldn't it be faster to directly go to the security node?
Go to the top of the page
 
+Quote Post
Fuchs
post Sep 23 2008, 10:55 AM
Post #447


Dragon
********

Group: Members
Posts: 4,328
Joined: 28-November 05
From: Zuerich
Member No.: 8,014



(Posted the search for the comm code and following probing rolls. If no alert is triggered, DD will install herself a back door, download security data (access codes/routines, cameras, patrols, etc.) and get out again.)
Go to the top of the page
 
+Quote Post
DWC
post Sep 23 2008, 12:24 PM
Post #448


Shooting Target
****

Group: Members
Posts: 1,973
Joined: 3-October 07
From: Fairfax, VA
Member No.: 13,526



QUOTE (Fuchs @ Sep 23 2008, 06:30 AM) *
I don't get why one would have to follow the access ID to the security node - wouldn't it be faster to directly go to the security node?


No one has been able to find anything on the facility's security node to use to connect to it so Truth is theorizing.
Go to the top of the page
 
+Quote Post
Fuchs
post Sep 23 2008, 12:28 PM
Post #449


Dragon
********

Group: Members
Posts: 4,328
Joined: 28-November 05
From: Zuerich
Member No.: 8,014



DD's not probing the facility - that's what Jake is doing - she's probing the building where the scientist lives.
Go to the top of the page
 
+Quote Post
Oenone
post Sep 23 2008, 04:33 PM
Post #450


Moving Target
**

Group: Members
Posts: 765
Joined: 27-July 08
From: England
Member No.: 16,167



QUOTE (Little Johnson @ Sep 23 2008, 06:47 AM) *
Jake if there is no outside access wont any live network security be onsite too?

If theres a corp hacker youll have to face he will have to be onsite. That meens if we can locate him and remove him or his access then youll have less opposition. Not too savy on matrix stuff but id bet IC is better to deal with than a live persona.


That depends, they could be running the security rigger via a hard wired connection. Say a direct fibre-optic link from another facility.

It's unlikely, but possible. Plus actually hunting down the security rigger in person means tracking him/her down in a large facility we have no maps for and then gaining access without being spotted. Which adds considerably to the time needed for the job, increases the risk and generally won't be worth the trouble.

EDIT - Out of interest what sort of house is it? And if it's an apartment and not a house then how many floors up is she? Does the place have a garden or car park? (If there have actually been maps linked to with this info on can someone direct me to them, as I can't remember seeing anything in the IC or OOC threads.)
Go to the top of the page
 
+Quote Post

58 Pages V  « < 16 17 18 19 20 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 17th January 2025 - 07:22 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.