![]() ![]() |
Nov 12 2010, 06:59 AM
Post
#51
|
|
|
panda! ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 10,331 Joined: 8-March 02 From: north of central europe Member No.: 2,242 |
3C. Brute force. Roll Hacking + Exploit (target's Firewall [+3 for Security Access, +6 for Admin.], Complex Action). Success logs you onto the Node.The Node gets a free roll on an Extended Analyze + Firewall (your Stealth) each time you roll. If the Node succeeds, it triggers an Alert. Its not so much if the node succeeds, but when it succeeds. that is, unless the hacker is god and the target is 1+1 toy. And at that point, i suspect the GM could simply allow the hacker to buy successes rather then roll (4:1 ratio). |
|
|
|
Nov 12 2010, 07:57 AM
Post
#52
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,018 Joined: 3-July 10 Member No.: 18,786 |
Its not so much if the node succeeds, but when it succeeds. that is, unless the hacker is god and the target is 1+1 toy. And at that point, i suspect the GM could simply allow the hacker to buy successes rather then roll (4:1 ratio). A good hacker (18 dice exploit is not hard, if that's your specialty), hacking admin on a rating 4 commlink with rating 6 stealth wins in less than two rounds, where it takes him two and a half to get noticed. Using edge can get you to win even against a rating 6 |
|
|
|
Nov 12 2010, 08:20 AM
Post
#53
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 266 Joined: 21-November 09 Member No.: 17,891 |
Now, if I could just tell the difference between: Computer and...Data Search...Electronic Warfare...Cybercombat...Hacking... Scan...Analyze...Browse... Track... I suppose I'll need to reread the Wireless section until it sinks in. So, the reason I say to manually Cross-Reference upthread is that when you draw lines from the Actions to the Programs and back, you learn which Matrix Actions anybody can do at any time, and which require specific Programs. You also learn which programs do only one thing: Armor, Attack, Biofeedback Filter, Black Hammer, Blackout, Browse, Data Bomb, Decrypt, Defuse, Disarm*, ECCM, Edit, Encrypt, Medic, Nuke*, Purge*, Reality Filter, Stealth, Track Which programs do two subtly different things: Analyze, Command, Corrupt*, Scan, Sniffer and which do several different things: Exploit *Programs from Unwired. |
|
|
|
![]() ![]() |
|
Lo-Fi Version | Time is now: 22nd January 2026 - 01:47 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.