En Garde, n00b!, Or, the nitty gritty of Cybercombat |
En Garde, n00b!, Or, the nitty gritty of Cybercombat |
Jan 29 2009, 05:40 PM
Post
#1
|
|
Running Target Group: Members Posts: 1,162 Joined: 16-November 07 Member No.: 14,229 |
After GMing a rather magic-centric group for a couple months, I've joined a rather tech-centric group so I can get some play time in. Since the group I was GMing never really messed around with the matrix rules, I realized that I had a big gap in my knowledge when it comes almost everything Matrix.
Ryu's Introduction into the Matrix Rules helped fill in many of the gaps, but I'm still very fuzzy on Cybercombat. I'm hoping either he or someone else could help fill in the last few missing pieces. Here's what I've been able to piece together:
Correct? Any steps I'm missing? -paws |
|
|
Jan 29 2009, 06:36 PM
Post
#2
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
Good to hear that it helped. (IMG:style_emoticons/default/smile.gif)
To engage in Cybercombat, you must be aware of the icon you want to attack. (You attack the persona/IC, not the node. "Construct" should be the catch-all term.) * Both attacker and defender need to be on the same node, so that the attacker can see the target icon. (Using a program on another node requires a subscription.) * If your target is hidden, you need to find it with matrix perception first. * I don´t think it is explicit that attacking makes you "visible". Initiative and Resolution are fine the way you describe it. |
|
|
Jan 29 2009, 07:42 PM
Post
#3
|
|
Running Target Group: Members Posts: 1,162 Joined: 16-November 07 Member No.: 14,229 |
That makes sense for full VR fights. And it jives with the these cheat sheets, which I just rediscovered. Of course, those are pretty much straight out of the BBB.
I guess what's really throwing me for a loop here is AR. If two AR users are fighting, they're really not in the same node since the only nodes involved would be their commlinks. So unless one is hacking the other there is no shared node. Right? Could one just launch an Attack program at the other designed to cripple their commlink? I would guess the answer is yes, but... I realy don't know. If this is the case though, then I'm guessing they only need to be within Signal range. Right? I'm not sure if it gets stickier or simpler when you do AR vs. VR. I don't even know where to start. If the VR user is in the AR user's commlink node, I guess then you could handle it pretty much as a full VR fight (except for initiative, and other minor details). -paws Ugh. What tangled mess. (IMG:style_emoticons/default/dead.gif) |
|
|
Jan 29 2009, 07:58 PM
Post
#4
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
If two AR users are fighting, they have to share one node, and that might well be one of commlinks. The persona of an AR user is present in all subscribed nodes, and in the originating node.
You see the wireless node of the targets commlink, subscribe to it, and attack the persona inside. Active PANs will accept outside subscription attempts, passive and hidden ones will require hacking. |
|
|
Jan 29 2009, 08:06 PM
Post
#5
|
|
Running Target Group: Members Posts: 1,336 Joined: 25-February 08 From: San Mateo CA Member No.: 15,708 |
Paws I think I get what your going for and sadly I don't how it works in the rules.
Here is my attempt at understanding your position and relating it to the rules. Disclaimer: I think I am wrong. Often, its possible to lock up or confuse another system without logging in to said system. DoS attacks, are an example. The gap here is the attack program. Its used against Programs(including Persona type programs?) and a commlink isn't a program. I don't think the rules have a special case for this example. Think of twisting the color instead. The hacking skill and exploit programs are used to find the weakness in the system. Normally, this is described as gaining various levels of account access. There is a direct parallel here. Some exploitable services run as users, security or root accounts. What you are looking to do, and again I am likely wrong, is to * Find an exploitable service * Attack the entire node, such as an commlink Which comes down to * Hakcing + Exploit, to find the exploit, with a threshold related to the privileges associated with the service. * In defense the system rolls Firewall (Plus system?) to try to detect the attack * Once in you do your damage. If "Got Root?" then Command + Computer Shutdown. The main change here is that you are not using the attack program. But you are still "attacking" the other commlink. Sorry if I am way off. |
|
|
Jan 29 2009, 09:13 PM
Post
#6
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
A commlink provides both a node and a persona.
The node of the commlink is set to active, passive, or hidden mode. - Subscribing to an active node is no problem - Subscribing to a passive node requires hacking to gain access - as does subscribing to a hidden node, which you would also have to find with WiFi-Scan first. Once on the node, you can attack any constructs present on it, provided you can see their icons. The commlink users persona is always there, but might also be hidden. |
|
|
Jan 29 2009, 09:40 PM
Post
#7
|
|
Running Target Group: Members Posts: 1,162 Joined: 16-November 07 Member No.: 14,229 |
Okay, I think I'm starting to wrap my brain around this. (Finally! (IMG:style_emoticons/default/dead.gif) )
So, if you walk around with your commlink in Active mode, you're a target, though there's not much a malicious script kiddie can do with just the attack programs. Other than be a minor annoyance. What if you're in Active mode, running a Hot Sim modded sim module? I suppose you'd still need to hack the system to get at the persona before you could Black Hammer them. Or could you immediately access it because its in Active mode? -paws |
|
|
Jan 29 2009, 09:47 PM
Post
#8
|
|
Running Target Group: Members Posts: 1,228 Joined: 24-July 07 From: Canada Member No.: 12,350 |
Okay, I think I'm starting to wrap my brain around this. (Finally! (IMG:style_emoticons/default/dead.gif) ) So, if you walk around with your commlink in Active mode, you're a target, though there's not much a malicious script kiddie can do with just the attack programs. Other than be a minor annoyance. What if you're in Active mode, running a Hot Sim modded sim module? I suppose you'd still need to hack the system to get at the persona before you could Black Hammer them. Or could you immediately access it because its in Active mode? -paws If someone is in Active mode running Hot-Sim, then someone could subscribe to them and start Black Hammering them right then and there. Suffice to say Active + Hot-Sim = not a good idea. |
|
|
Jan 29 2009, 09:48 PM
Post
#9
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
Running around in active mode with a hot SIM-module is asking for Blackhammer attacks, yes. Attackers still need to perform a log-in action (public account), but active nodes will accept subscription requests, so no problem there.
|
|
|
Jan 30 2009, 01:04 AM
Post
#10
|
|
Moving Target Group: Members Posts: 113 Joined: 11-December 05 From: Philadelphia, UCAS Member No.: 8,063 |
Okay, I think I'm starting to wrap my brain around this. (Finally! (IMG:style_emoticons/default/dead.gif) ) So, if you walk around with your commlink in Active mode, you're a target, though there's not much a malicious script kiddie can do with just the attack programs. Other than be a minor annoyance. What if you're in Active mode, running a Hot Sim modded sim module? I suppose you'd still need to hack the system to get at the persona before you could Black Hammer them. Or could you immediately access it because its in Active mode? -paws Just remember you can attack the node/system itself in an attempt to crash the thing. If you're walking around in Active mode and some script kiddie logs in, he can trash the hell out of your commlink, forcing a reboot. Much like your bally-hooed DDOS attacks. Though it does raise the question - do you actually need to log on to a node in order to attack and crash it? Rules-wise, I think yes. But fluff wise... ya' think? |
|
|
Jan 30 2009, 01:08 AM
Post
#11
|
|
Moving Target Group: Members Posts: 732 Joined: 21-July 05 From: Seattle Member No.: 7,508 |
A commlink provides both a node and a persona. The node of the commlink is set to active, passive, or hidden mode. - Subscribing to an active node is no problem - Subscribing to a passive node requires hacking to gain access - as does subscribing to a hidden node, which you would also have to find with WiFi-Scan first. Once on the node, you can attack any constructs present on it, provided you can see their icons. The commlink users persona is always there, but might also be hidden. There is a misunderstanding here. An active node (we'll say its a commlink) can be automatically found, with a Free Action. But the Active, Passive, or Hidden Mode does not make it easier/harder to subscribe to the node and attack someone - it just dictates how easy (or difficult) it is to find the node. Connecting to the commlink requires different measures: either a data exchange or a subscription. A data exchange is easy, if the commlink it is in Active mode and has a public access area. You send the commlink your Access ID and a simple connection is established. [note that commlinks, or any node, may disable the public access feature] You can see the personal profile, public blogs, and that sort of information that the person chooses to broadcast. It is important to note that with public access-where you only exchange your Access ID- there is no subscription. This is simply a Data Request (see p. 54, Unwired), which includes the following: Audio/Visual communication, social networking, website requests, database access, file transfers. There is no log-on action. In a public access area, you cannot attack anyone. There is no subscription between you and the node. (Unwired, p. 53) QUOTE From your persona interface, you may access other nodes. If you are simply making a comcall or data request, accessing a public site or profile, or otherwise connecting to a public account, no subscription or login is required—your access ID suffices. If you are logging in to a user/security/admin account, communicating with encryption, controlling an agent/drone, or making some other bandwidth intensive connection, a subscription is required, and counts against your subscription limit (p. 51). If you want to attack a persona in a commlink (or any node) you must get an account on that node. This requires hacking a User account (or higher): (Unwired, p. 52) QUOTE The most important privilege normally granted via user access is one slot on the subscription list. This allows the user, or any of his agents, to enter the node in VR or AR mode. While many people may have their commlinks set with little security, it is possible to set your commlink to only allow Security or Admin accounts, meaning hacking it will require a +3 or +6 threshold. They can also have their persona running stealth, making it difficult for you to find (and attack) their persona. |
|
|
Jan 30 2009, 01:10 AM
Post
#12
|
|
Moving Target Group: Members Posts: 732 Joined: 21-July 05 From: Seattle Member No.: 7,508 |
|
|
|
Jan 30 2009, 01:42 AM
Post
#13
|
|
Mr. Johnson Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
EDIT: Nothing to see here, shouldn't have said anything. Sorry.
|
|
|
Jan 30 2009, 02:02 AM
Post
#14
|
|
Running Target Group: Members Posts: 1,336 Joined: 25-February 08 From: San Mateo CA Member No.: 15,708 |
Yes, you need to log onto a node to crash it. In my Example, it was log in as root and shutdown. Still possible, yes? I know its not colorful. . As much as I appreciate your answer, it burns part of me inside that it refers solely to Unwired. I even own the book, which I love. Just wish the answers were squarely in the BBB for something this simple. |
|
|
Jan 30 2009, 02:21 AM
Post
#15
|
|
Moving Target Group: Members Posts: 732 Joined: 21-July 05 From: Seattle Member No.: 7,508 |
As much as I appreciate your answer, it burns part of me inside that it refers solely to Unwired. I even own the book, which I love. Just wish the answers were squarely in the BBB for something this simple. The BBB only lists three account access levels: User, Security, Admin, and then goes on to describe the process of getting an account on a node under one of those levels ["accessing a node without authorization requires hacking" p 220]. Without the Public Access bit mentioned in Unwired, the question of if you can attack a persona in a node without hacking yourself an account on the node first isn't relevent. (ie, I used the Unwired quotes because the question is one raised by the expanded info in Unwired) It is true the "Crash Program/OS" action on p. 223 leaves it open for question on whether you need to be in the node to crash it. You do need to be in the node, however. The text could be written much more clearly. |
|
|
Jan 30 2009, 08:56 AM
Post
#16
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
There is a misunderstanding here. An active node (we'll say its a commlink) can be automatically found, with a Free Action. But the Active, Passive, or Hidden Mode does not make it easier/harder to subscribe to the node and attack someone - it just dictates how easy (or difficult) it is to find the node. Connecting to the commlink requires different measures: either a data exchange or a subscription. A data exchange is easy, if the commlink it is in Active mode and has a public access area. You send the commlink your Access ID and a simple connection is established. [note that commlinks, or any node, may disable the public access feature] You can see the personal profile, public blogs, and that sort of information that the person chooses to broadcast. It is important to note that with public access-where you only exchange your Access ID- there is no subscription. This is simply a Data Request (see p. 54, Unwired), which includes the following: Audio/Visual communication, social networking, website requests, database access, file transfers. There is no log-on action. Learn something new each day! Thanks for the correction. (IMG:style_emoticons/default/smile.gif) |
|
|
Jan 30 2009, 11:59 AM
Post
#17
|
|
Awakened Asset Group: Members Posts: 4,464 Joined: 9-April 05 From: AGS, North German League Member No.: 7,309 |
Check me on this if you will. (IMG:style_emoticons/default/smile.gif)
A matrix node can be set to active, passive, or hidden mode.
Subscriptions:
|
|
|
Jan 30 2009, 09:09 PM
Post
#18
|
|
Running Target Group: Members Posts: 1,228 Joined: 24-July 07 From: Canada Member No.: 12,350 |
Adding on to Ryu's excellent summary:
* You must have a Subscription (and thus at least User level access) to a Node in order to perform any action beyond a Spoof * All of these rules apply in AR or VR mode. The only difference between the two modes is the Initiative rolled, and the way the digital world is displayed to the user. |
|
|
Jan 30 2009, 11:40 PM
Post
#19
|
|
Moving Target Group: Members Posts: 732 Joined: 21-July 05 From: Seattle Member No.: 7,508 |
I'd agree with both summaries. (IMG:style_emoticons/default/smile.gif)
|
|
|
Jan 30 2009, 11:51 PM
Post
#20
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
mode examples:
active: your basically carrying a big virtual sign with a arrow on it, pointing towards you, along with name and phone number in big letters. passive: you no longer have the sign, but you still have some kind of ID on you, and your phone will accept any incoming calls. hidden: you have discarded all forms for ID, and your phone only accept calls on your list of known numbers. the best way to envision AR is like a laptop of today, only that the screen is a image displayed on your sunglasses, and the keyboard and mouse is a similarly faked, accessed via finger and hand movements read by trodes, jack or gloves. |
|
|
Jan 31 2009, 12:19 AM
Post
#21
|
|
panda! Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
btw, i discovered something interesting. when a persona is crashed via cybercombat, the user may suffer dumpshock (if using VR), but the comlinks node do not crash.
the thing that made me reread the damage part of cybercombat was that having a node crash along with a persona made little sense for a nexi, that could handle multiple persona. so the only way to crash a node is to get in there with ones own persona (or send in a agent) and use the crash program on it. it seems more and more that the age of VR combat is gone. replaced by AR combat performed by hackers with wired reflexes or adepts. no dumpshock when a persona crashes, and no way for black hammer or blackout to harm one, especially if working by way of glasses and gloves, rather then trodes or jack. one thing about getting a mental idea of the SR4 matrix tho, dont worry to much about direct radio range. ones one assume that one can go to any node out there, independent of it being in direct range of your own comlink, things become much simpler. |
|
|
Lo-Fi Version | Time is now: 21st November 2024 - 10:05 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.