Apr 20 2010, 11:52 PM
Post
#1
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 174 Joined: 28-February 08 Member No.: 15,719 |
Here is an example of how I understand hacking to work as a GM that is going to be running his first game of 4th edition in a week or two. I'll use Frank the Hacker in my exampl
Frank the Hacker --Attributes-- B-4 A-3 R-5 S-3 C-3 I-5 L-4 W-3 E-4 Initiative (Matrix) 10 (11) Initiative Passes (Matrix) 1 (3) --Active Skills-- Cybercombat: 4 Electronics Skill Group: 4 Electronic Warfare: 5 Hacking: 5 Perception: 3 Pistol: 2 --Qualities-- Codeslinger (Hack on the Fly) --Augmentations-- Implanted Commlink (Sony Emperor w/ Sim Module modifed for BTL/Hot Sim, w/Response 5, Signal 5, System 5, Firewall 5); Control Rig; Datajack; Data Lock (Encryption 5) --Matrix Gear-- Subvocal Microphone; Programs [Analyze 5, Armor 4, Attack 5, Biofeedback Filter 4, Black Hammer 4, Browse 5, Command 5, Data Bomb 2, Decrypt 3, Edit 5, Exploit 5, Scan 5, Spoof 4, Stealth 5, Track 4 Example 1 - Using the food fight 4.0 premise, Frank and his crew are at a stuffer shack at 0400 when an assassination crew attacks the store. A gun fight between the runners and the assassination squad ensues. The Stuffer Shack's node's stats are: Firewall 2, Response 2, Signal 3, System 2 ARC: Terminate Connection Frank currently has Exploit, Stealth, Biofeedback filter, and Scan loaded. Frank knows that all of his crew have low-light vision so he decides he's going to cut the lights. Since he's using AR instead of VR he uses his meatbody Init of 10 and only gets 1 pass a turn. When his action phase comes up he tries to hack on the fly into the Stuffer Shack's node. Hacking + Exploit (Firewall, Complex Action) Extended test, so 10 (2, Complex Action), resulting in 1 - 2 - 4 - 6 - 6 - 2 - 5 - 6 - 6 - 3: 4 hits, plenty to get an user account and log Frank onto the node. The node does its Analyze + Firewall (hacker's Stealth) Extended test, so 2 (5) Extended test and gets 6 - 1: 1 hit, which the GM records in-case of future rolls towards an alert. Once in he uses his free action to Change Linked Device Mode (SR4A pg. 228) to turn off the lights. (Is that how it's done, or does he have to hack into the lights' node, which I would assume is hardwired to the main node and not wireless, and then use "Change Linked Device Mode", or would it be "Issue Command"?) ------------- I'll continue to update this example to make sure I understand the rules steadily. Thanks so much for anyone's help/comments. |
|
|
|
fazzamar Example of Hacker in Action by a SR4 newbie Apr 20 2010, 11:52 PM
fazzamar Since this is about to fall of the first page with... Apr 21 2010, 05:28 AM
Udoshi As I understand it, hacking is pretty simple, and ... Apr 21 2010, 07:39 AM
DMiller Here’s my interpretation of the rules:
In your fir... Apr 21 2010, 07:45 AM
Udoshi QUOTE (DMiller @ Apr 21 2010, 12:45 AM) H... Apr 21 2010, 08:14 AM
fazzamar QUOTE (Udoshi @ Apr 21 2010, 04:14 AM) Ag... Apr 21 2010, 04:00 PM
Udoshi QUOTE (fazzamar @ Apr 21 2010, 09:00 AM) ... Apr 21 2010, 11:43 PM![]() ![]() |
|
Lo-Fi Version | Time is now: 15th December 2025 - 02:33 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.