OOC: Phoenix Rising, Out of Character thread for the runners |
OOC: Phoenix Rising, Out of Character thread for the runners |
Sep 22 2008, 07:37 PM
Post
#426
|
|
Dragon Group: Members Posts: 4,328 Joined: 28-November 05 From: Zuerich Member No.: 8,014 |
Yes, 14d6 is hacking and exploit, the electronic warfare and scan was the "scanning for hidden nodes" in the first spoiler.
|
|
|
Sep 22 2008, 07:38 PM
Post
#427
|
|
Moving Target Group: Members Posts: 199 Joined: 18-August 08 Member No.: 16,250 |
If hitting her while shes still in the water would neutrelize the fire elementel then we should take that into concideration.
makes a hit from either bank more appealing.and or swamping her with drone fire and a waterelemental to pull all the peices to the botum . |
|
|
Sep 22 2008, 07:46 PM
Post
#428
|
|
Shooting Target Group: Members Posts: 1,973 Joined: 3-October 07 From: Fairfax, VA Member No.: 13,526 |
Crizh: It's actually probably going to make the attack on her commlink harder. Generally, you'd slave a commlink to something more secure so that anyone who wants to hack it has to hack the master node. Unless her commlink isn't slaved during the day, DD's about to find out how secure the master node is.
|
|
|
Sep 22 2008, 07:48 PM
Post
#429
|
|
Moving Target Group: Members Posts: 661 Joined: 23-March 03 Member No.: 4,322 |
If hitting her while shes still in the water would neutrelize the fire elementel then we should take that into concideration. makes a hit from either bank more appealing.and or swamping her with drone fire and a waterelemental to pull all the peices to the botum . Fire Elementals are severely allergic to water (Water Elementals are alergic to fire). So attacking in the middle of the water can't be good for the thing. |
|
|
Sep 22 2008, 07:51 PM
Post
#430
|
|
Runner Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 |
|
|
|
Sep 22 2008, 07:54 PM
Post
#431
|
|
Dragon Group: Members Posts: 4,328 Joined: 28-November 05 From: Zuerich Member No.: 8,014 |
Well, if the commlink in her head is not operating in wireless right now, then DD won't find it to hack it. Simple (IMG:style_emoticons/default/nyahnyah.gif)
|
|
|
Sep 22 2008, 08:02 PM
Post
#432
|
|
Runner Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 |
Well, if the commlink in her head is not operating in wireless right now, then DD won't find it to hack it. Simple (IMG:style_emoticons/default/nyahnyah.gif) It has to be, it's slaved to another remote node. If you can analyse/decrypt the data-stream you can step into the middle pretending to be the Master. You wouldn't even need to load up exploit... You could create the back door you already posted rolls for and re-slave it to one of your own nodes and spoof a dummy node with her AccessID. Neither end would be aware of the "Man in the middle" until it was too late... |
|
|
Sep 22 2008, 08:03 PM
Post
#433
|
|
Shooting Target Group: Members Posts: 1,973 Joined: 3-October 07 From: Fairfax, VA Member No.: 13,526 |
It probably is, since it's most likely acting as a chokepoint to all her other cyberware. It's how all the PC hackers are set up. (IMG:style_emoticons/default/smile.gif)
|
|
|
Sep 22 2008, 08:05 PM
Post
#434
|
|
Moving Target Group: Members Posts: 651 Joined: 15-September 06 From: Ephrata, Wa Member No.: 9,382 |
It has to be, it's slaved to another remote node. If you can analyse/decrypt the data-stream you can step into the middle pretending to be the Master. You wouldn't even need to load up exploit... You could create the back door you already posted rolls for and re-slave it to one of your own nodes and spoof a dummy node with her AccessID. Neither end would be aware of the "Man in the middle" until it was too late... Crizh: She was slaved to an other node last night not today. It's just her headware commlink standing all alone in the dark. (IMG:style_emoticons/default/smile.gif) |
|
|
Sep 22 2008, 08:06 PM
Post
#435
|
|
Shooting Target Group: Members Posts: 1,973 Joined: 3-October 07 From: Fairfax, VA Member No.: 13,526 |
Oh, and by spoofing her AccessID, you can probably just walk unmolested through the building''s electronic security during the incursion, since the building would think the spoofing node is actually her.
|
|
|
Sep 22 2008, 08:09 PM
Post
#436
|
|
Moving Target Group: Members Posts: 765 Joined: 27-July 08 From: England Member No.: 16,167 |
Fire Elementals are severely allergic to water (Water Elementals are alergic to fire). So attacking in the middle of the water can't be good for the thing. Hmm but can't elementals just fly? In which case it'll just float above the boat and torch things, staying well away from the actual water. Perhaps if someone has a spell / spirit power which controls water so we can soak it? One thing we might want to consider is proof of death, something we can't actually be sure of if she's lost at sea. Which might in turn reduce the amount Johnson is willing to actually pay us. |
|
|
Sep 22 2008, 08:10 PM
Post
#437
|
|
Runner Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 |
Crizh: She was slaved to an other node last night not today. It's just her headware commlink standing all alone in the dark. (IMG:style_emoticons/default/smile.gif) Just to clarify, during her class her headware comm-link is wireless-dark? In which case DD cannot, indeed, detect it at all. |
|
|
Sep 22 2008, 08:13 PM
Post
#438
|
|
Shooting Target Group: Members Posts: 1,973 Joined: 3-October 07 From: Fairfax, VA Member No.: 13,526 |
I think he meant it's not slaved to anything. Considering where she is and what she does, it's probably not even in Hidden Mode.
|
|
|
Sep 22 2008, 08:13 PM
Post
#439
|
|
Moving Target Group: Members Posts: 651 Joined: 15-September 06 From: Ephrata, Wa Member No.: 9,382 |
Just to clarify, during her class her headware comm-link is wireless-dark? In which case DD cannot, indeed, detect it at all. No, the last part was a joke. her commlink was in hidden mode but active. I'd think it would be in hidden mode at the lest to keep students from playing with it. Brent |
|
|
Sep 22 2008, 08:14 PM
Post
#440
|
|
Shooting Target Group: Members Posts: 1,973 Joined: 3-October 07 From: Fairfax, VA Member No.: 13,526 |
|
|
|
Sep 22 2008, 08:16 PM
Post
#441
|
|
Moving Target Group: Members Posts: 651 Joined: 15-September 06 From: Ephrata, Wa Member No.: 9,382 |
it's her classroom, I'd really don't think she needs to broadcast her SIN in there.
|
|
|
Sep 22 2008, 08:41 PM
Post
#442
|
|
Runner Group: Members Posts: 2,666 Joined: 29-February 08 From: Scotland Member No.: 15,722 |
In which case DD may, indeed have been able to hack into it and create a backdoor.
The access logs in particular would be of interest as they would give details of the node she slaves it to for work. |
|
|
Sep 22 2008, 09:44 PM
Post
#443
|
|
Dragon Group: Members Posts: 4,328 Joined: 28-November 05 From: Zuerich Member No.: 8,014 |
DD got detected, and the node shut off.
|
|
|
Sep 22 2008, 10:56 PM
Post
#444
|
|
Dragon Group: Members Posts: 4,328 Joined: 28-November 05 From: Zuerich Member No.: 8,014 |
(I'd like some idea of what is expected of DD.)
|
|
|
Sep 23 2008, 05:47 AM
Post
#445
|
|
Moving Target Group: Members Posts: 199 Joined: 18-August 08 Member No.: 16,250 |
Jake if there is no outside access wont any live network security be onsite too?
If theres a corp hacker youll have to face he will have to be onsite. That meens if we can locate him and remove him or his access then youll have less opposition. Not too savy on matrix stuff but id bet IC is better to deal with than a live persona. |
|
|
Sep 23 2008, 10:30 AM
Post
#446
|
|
Dragon Group: Members Posts: 4,328 Joined: 28-November 05 From: Zuerich Member No.: 8,014 |
I don't get why one would have to follow the access ID to the security node - wouldn't it be faster to directly go to the security node?
|
|
|
Sep 23 2008, 10:55 AM
Post
#447
|
|
Dragon Group: Members Posts: 4,328 Joined: 28-November 05 From: Zuerich Member No.: 8,014 |
(Posted the search for the comm code and following probing rolls. If no alert is triggered, DD will install herself a back door, download security data (access codes/routines, cameras, patrols, etc.) and get out again.)
|
|
|
Sep 23 2008, 12:24 PM
Post
#448
|
|
Shooting Target Group: Members Posts: 1,973 Joined: 3-October 07 From: Fairfax, VA Member No.: 13,526 |
|
|
|
Sep 23 2008, 12:28 PM
Post
#449
|
|
Dragon Group: Members Posts: 4,328 Joined: 28-November 05 From: Zuerich Member No.: 8,014 |
DD's not probing the facility - that's what Jake is doing - she's probing the building where the scientist lives.
|
|
|
Sep 23 2008, 04:33 PM
Post
#450
|
|
Moving Target Group: Members Posts: 765 Joined: 27-July 08 From: England Member No.: 16,167 |
Jake if there is no outside access wont any live network security be onsite too? If theres a corp hacker youll have to face he will have to be onsite. That meens if we can locate him and remove him or his access then youll have less opposition. Not too savy on matrix stuff but id bet IC is better to deal with than a live persona. That depends, they could be running the security rigger via a hard wired connection. Say a direct fibre-optic link from another facility. It's unlikely, but possible. Plus actually hunting down the security rigger in person means tracking him/her down in a large facility we have no maps for and then gaining access without being spotted. Which adds considerably to the time needed for the job, increases the risk and generally won't be worth the trouble. EDIT - Out of interest what sort of house is it? And if it's an apartment and not a house then how many floors up is she? Does the place have a garden or car park? (If there have actually been maps linked to with this info on can someone direct me to them, as I can't remember seeing anything in the IC or OOC threads.) |
|
|
Lo-Fi Version | Time is now: 17th January 2025 - 07:22 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.