IPB

Welcome Guest ( Log In | Register )

3 Pages V  < 1 2 3 >  
Reply to this topicStart new topic
> decker tricks, show off your genius
Panzergeist
post Feb 11 2004, 01:07 AM
Post #26


Running Target
***

Group: Members
Posts: 1,362
Joined: 3-October 03
From: Poway, San Diego County, CA, USA
Member No.: 5,676



Who needs decking? Just have a teammate infiltrate the base and run a bar magnet over the security host.
Go to the top of the page
 
+Quote Post
mfb
post Feb 11 2004, 01:10 AM
Post #27


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



...computers in 2060 use optical storage. what's a magnet going to do?

and also, why would you need to modify your newly-forged account to make it looks like it's been there all along? that's what validating it is--making it seem legit. the only reason an admin would invalidate it is if the account were brought to their attention as being faked--like, say, the guy using it racks up security tally.
Go to the top of the page
 
+Quote Post
Panzergeist
post Feb 11 2004, 01:22 AM
Post #28


Running Target
***

Group: Members
Posts: 1,362
Joined: 3-October 03
From: Poway, San Diego County, CA, USA
Member No.: 5,676



Computers still use electrical wiring, which can be affected my magnets. The magnet would cause some wires to misfire, causing some of the photon circuits to misfire, causing a few improper 1's, 0's, and 2's. (Or one-zero dualities, thoguh I imagine people just call them twos) This wouldn't be nearly as bad as degaussing a magnetic drive, but it would cause some bugs and fragmentation.
Go to the top of the page
 
+Quote Post
mfb
post Feb 11 2004, 01:31 AM
Post #29


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



a few. you'd have to have a really, really powerful magnet, though, and it'd take a really, really long time to have any significant effect. i mean, heck, the computer you use right now is chock full of magnets. long before you manage to screw up an optical computer, someone will have noticed the errors and gone on a magnet hunt.
Go to the top of the page
 
+Quote Post
gknoy
post Feb 11 2004, 02:05 AM
Post #30


Moving Target
**

Group: Members
Posts: 413
Joined: 20-November 03
Member No.: 5,835



QUOTE (mfb)
the command set waits 24 hrs, then validates a new user account (24 hrs is the minimum time a spoofed account will remain valid). with the new user account, it then does one Send Data to email you the new account information, then does a second Send Data to call up the saved copy of itself.

Better than "email" -- given the problems with the hackability of such accounts -- is to incur a high signal to noise ratio (like someone mentioned with the 50k porn emails, lol! GOOD idea!), and write out data that doesn't look like account information.

First, you'd want to encrypt the data. Then, you'd want to obfuscate it by including it in some small subset of data, like a "debug dump" or somesuch. This data can then be :

(a) stuck in some commonly used holding area on the host (equivalent of /tmp/ on a modern unix host), to be later downloaded manually by you -- you deck in, grab a file with 5-10 valid accounts in it, and log out -- even better if you use a valid login for THAT, and not be a nuisance to the system...

(b) uploaded to a dead drop - similar to a "mail" account, but rather than having a canonical "inbox" or anything like that, it is spooled through another process that does even more obfuscation and then sends it on to someplace else you can pick it up.

Note that this can be strung together to several levels (just like you might with a redirect-datatrail operation, for example). Make the initial process (that gathers/creates/whatevers valid account information) send to multiple destinations. Make some of those do the same. Obfuscate the purpose of some of these by making it look like they do something harmless with it (like dump the message to a log as a "received error", or somesuch). Make some of them look like a poorly written university project.

The security deckers will find your original stuff. They might shut it down, or they might be confused as to what it does (even better if the program looks like it's supposed to do something USEFUL (to them) there. Bonuses if you can make them think that one of the other deckers wrote it as a quick onetime knockoff utility. ;)

If they follow it on and see what it does, they might find that it writes a log. They'll examine it, but if you've been careful, they shouldn't be able to realize that the file that's dumped contains any Information, but rather is junk. (Hell, make it look like a debug/coredump, or something. Even better, have your program ACTUALLY crash and send that data to the system's NORMAL error logging function - so that it looks like a legitemate death.)

If they realize that your utility sends data elsewhere, they might hack in to THOSE places. Or, they might think that it's correspondence between two researchers, or something. If you've been careful about hiding the information.

The security deckers have finite time and resources - more than you, yes, but you can easily make the job look like it's of low importance/threat. If they either don't recognize what your program Really Does, or can't figure out where it sends it (or why), you're pretty much scot free. If they DO figure out what your program does, they will probably just shut it down so it won't run again, but will probably not expend the resources to develop an agent to send looking for you.

Skills needed:
Encryption knowledge skill, probably: so that the data you hide will not be obviously acocunt information.
Steganography, so that you can hide Real Data inside other harmless looking data.
:-)
Forgery: to enable you to write convincing-looking Fake Stuff, perhaps - like emails between department heads, or bad spam responses, etc.

Go to the top of the page
 
+Quote Post
hobgoblin
post Feb 11 2004, 12:25 PM
Post #31


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



ye gods.
Go to the top of the page
 
+Quote Post
BonJoviJones
post Feb 11 2004, 05:45 PM
Post #32


Target
*

Group: Members
Posts: 7
Joined: 8-July 03
Member No.: 4,893



It seems to me that any security personnel capable of back-decking a connection is probably savvy enough to notice a new account being created every 24 hours on the mark. Even if the program waited a random amount of time and made a new account, new accounts should be pretty obvious.

The rules are the problem. The minimum time it takes to find a fake account is 24 hours? Maybe for the first one or two, but that rule is much too static for any serious security procedure.

Possible Motto: Static rules are inherently unrealistic and can be exploited by players to great gain. Worry more about the dynamic reactions of the parties involved.
Go to the top of the page
 
+Quote Post
Zazen
post Feb 11 2004, 09:09 PM
Post #33


Shooting Target
****

Group: Members
Posts: 1,685
Joined: 17-August 02
Member No.: 3,123



QUOTE (gknoy)
Better than "email" -- given the problems with the hackability of such accounts -- is to... write out data that doesn't look like account information.

My first idea was to have it emailed to a local paper, one that offers free personal ads. That way you can't possibly be traced when you go to the corner and pick up a paper. The accounts are only around for 24 hours, though, so I scrapped the idea.

A better one would be to post to a public forum ("HOWRD STERN RULZ!!!!!!!!!jiogfjei943urui3/j842rj8f934jr!!!!! BA BA BOOOOEY HAHAHAHAHAHA U SUK!!!!!!!1121@!2!@!").
Go to the top of the page
 
+Quote Post
mfb
post Feb 11 2004, 10:46 PM
Post #34


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



i've always assumed that the Validate Account operation includes making the account appear to have a history--that is, changing the dates and adding some logs so that the account doesn't look new. any actual new account would get a thorough check by the system, but if you manage to fool the system into thinking the account has been there all along, you avoid that. you also end up avoiding the pattern of having a new account show up every 24 hrs.
Go to the top of the page
 
+Quote Post
BonJoviJones
post Feb 12 2004, 04:00 PM
Post #35


Target
*

Group: Members
Posts: 7
Joined: 8-July 03
Member No.: 4,893



QUOTE (mfb)
i've always assumed that the Validate Account operation includes making the account appear to have a history--

Being that people are aware that Validate exists, you'd think they'd have a printout in their office of all the accounts on the system, or on some sort of write-once media, and simply compare with the known-good copy.

The first rule of security decking is never trust anything, not even your own system. If target matrix sites don't adhere to that, then yeah, they're pretty much screwed.
Go to the top of the page
 
+Quote Post
Dashifen
post Feb 12 2004, 04:59 PM
Post #36


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



QUOTE (BonJoviJones @ Feb 12 2004, 11:00 AM)
QUOTE (mfb)
i've always assumed that the Validate Account operation includes making the account appear to have a history--

Being that people are aware that Validate exists, you'd think they'd have a printout in their office of all the accounts on the system, or on some sort of write-once media, and simply compare with the known-good copy.

Agreed. I usually concider the office I work for. We do a daily backup, on Fridays it's a weekly backup, on a two-week rotation. That means that every day we have 14 days to backup our data just in case of a problem.

So, that means that if something strange happens one would have a record of the valid accounts on the system and could compare them to the current accounts on the system. Plus, if the sec. deckers missed the problem, then they might have quite a lot of temporal information to find out when the validation took place. Therefore, they might be able to notice the actions of the command set that started out this whole conversation.

Basically it still comes down to this point: Deckers can easily fool the system into thinking they're legitimate, and they can obfuscate that fact from other deckers. But, they can never completely eliminate every trace of information concerning that account.

Otherwise, you'd have deckers with a Validate 8 or 9 utility that they program themselves (to avoid the cost on purchasing such a program) who do nothing but log on and try to validate a super user account. If they fail, log off, waith 24 hours for your tally to drop to zero and then try again until they succeed. Only time and the ability of a sec. decker to notice patterns in the system that the system itself cannot prevent this.
Go to the top of the page
 
+Quote Post
mfb
post Feb 12 2004, 06:45 PM
Post #37


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



hence the reason validated accounts don't last forever. deckers don't usually pull the kind of trick you describe in your last para, dashifen, because once they manage to forge an account, it's only going to last a maximum of (1d6 x succs) days.

and if your command set gets deleted, who cares? you've got fifty more, on fifty other RTGs.
Go to the top of the page
 
+Quote Post
Nikoli
post Feb 12 2004, 07:11 PM
Post #38


Chicago Survivor
*********

Group: Dumpshocked
Posts: 5,079
Joined: 28-January 04
From: Canton, GA
Member No.: 6,033



Well, I have a solution for the anonymous, untraceable email drop-box. The pager listed in the BBB basically receives email, voice messages and even faxes (why faxes still exist in SR is beyond me though), up to 5mp if I remember correctly. So, hop into a stuffer shack, snag a :nuyen:10 to :nuyen: 50 pager and plug it into an open port on the ol' deck. No big deal.
Go to the top of the page
 
+Quote Post
mfb
post Feb 13 2004, 02:15 AM
Post #39


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



yeah, but it's a cellular device, which can be easily triangulated. since they can't get your email address, they'll just have to make do with your physical location!
Go to the top of the page
 
+Quote Post
Kanada Ten
post Feb 13 2004, 02:32 AM
Post #40


Beetle Eater
********

Group: Dumpshocked
Posts: 4,797
Joined: 3-June 02
From: Oblivion City
Member No.: 2,826



Pagers only receive data in SR, they don't broadcast (a lot). Meaning they would have to be damn good to get a lock when the pager goes ping every few hours.
Go to the top of the page
 
+Quote Post
mfb
post Feb 13 2004, 02:46 AM
Post #41


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



right, but the pager's number would necessarily be included in your command set. once they have that, the sec decker can just hack your service provider and force it to query your pager.
Go to the top of the page
 
+Quote Post
Kanada Ten
post Feb 13 2004, 02:52 AM
Post #42


Beetle Eater
********

Group: Dumpshocked
Posts: 4,797
Joined: 3-June 02
From: Oblivion City
Member No.: 2,826



Wait, wouldn't your first trick work for the pager provider too? You could have your pager switching id everytime it* detects a suspicious set of queries. You could even have various pager numbers - thus you know which security system discovered you and which passwords are now worthless.

*I obvioulsy assume one can hack their own pager.
Go to the top of the page
 
+Quote Post
mfb
post Feb 13 2004, 11:18 AM
Post #43


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



indeed.
Go to the top of the page
 
+Quote Post
Fenris
post Feb 13 2004, 04:08 PM
Post #44


GM of DOOM!
*******

Group: Members
Posts: 3,893
Joined: 20-March 03
From: San Diego
Member No.: 4,296



Since we're tossing up cool decker tricks, does anyone else think the drawbacks for a satellite hookup are more then worth the benefit of the fact that you can't be traced back to a meat body?
Go to the top of the page
 
+Quote Post
Nikoli
post Feb 13 2004, 04:42 PM
Post #45


Chicago Survivor
*********

Group: Dumpshocked
Posts: 5,079
Joined: 28-January 04
From: Canton, GA
Member No.: 6,033



That is in fact very smooth. Just love satellite jumping.
Go to the top of the page
 
+Quote Post
Shockwave_IIc
post Feb 14 2004, 07:51 AM
Post #46


Shooting Target
****

Group: Members
Posts: 1,512
Joined: 16-August 03
From: Northampton
Member No.: 5,499



QUOTE (Fenris)
Since we're tossing up cool decker tricks, does anyone else think the drawbacks for a satellite hookup are more then worth the benefit of the fact that you can't be traced back to a meat body?

Myself, Grey, Lindt and Dash, had a disscussion on this in our game (Misfits) and although it is canon that you can't be traced if your satlinking, i do agree with grey on the fact that you should be able to interrogate the sat into where it's uploading/ download from, because the matrix is a 2-way connection.

Side note: techincally you don't actually need a satlink uttilaty, hack into somewhere that use's satlinks them selfs and borrow theirs.
Go to the top of the page
 
+Quote Post
simonw2000
post Feb 14 2004, 09:09 AM
Post #47


Moving Target
**

Group: Members
Posts: 402
Joined: 23-April 03
From: London, UK
Member No.: 4,491



I was looking at Virtual Realities 2.0, and it shows Ares' hottest decker, Pyro with a custom-built attack program called "Napalm Blast"! Could it be an attack program that can hit more than one target?
Go to the top of the page
 
+Quote Post
mfb
post Feb 14 2004, 01:16 PM
Post #48


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



attack progs that attack multiple opponents are possible with Matrix. i thought program options were included in VR 2.0 as well, but i guess i was mistaken.

determining one's physical location by querying the satellite is only possible if the satellite has some means of determining the direction that a given signal is originating from. most satellites, as far as i'm aware, do not have this capability; there's simply no reason to have it.
Go to the top of the page
 
+Quote Post
Shockwave_IIc
post Feb 14 2004, 01:26 PM
Post #49


Shooting Target
****

Group: Members
Posts: 1,512
Joined: 16-August 03
From: Northampton
Member No.: 5,499



The matrix is a2-way thing no? you send a siganl telling it you want to do, it sends a return telling you to frag off. The satalite needs to know where to send that frag off to.
Go to the top of the page
 
+Quote Post
hobgoblin
post Feb 14 2004, 02:31 PM
Post #50


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



a sat works by basicly bombarding a big area with a signal, its not tightbeam at all. so while you can get the general area this area can be say they size of europe :)

program options where in virtual 2.0, you are looking at the area option for multitarget effects.
Go to the top of the page
 
+Quote Post

3 Pages V  < 1 2 3 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 4th February 2025 - 08:05 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.