IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Hacker walkthrough, is there one?
James McMurray
post May 26 2011, 03:59 PM
Post #1


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



Is there a simplified walkthrough of a hack on a node? The runner's toolkit has an entire run walkthrough, but their hacker is a technomancer and I'm just wanting to learn the basic stuff.
Go to the top of the page
 
+Quote Post
Fatum
post May 26 2011, 04:10 PM
Post #2


Runner
******

Group: Dumpshocked
Posts: 2,801
Joined: 2-September 09
From: Moscow, Russia
Member No.: 17,589



Yes. Hacking subchapter in the Wireless World chapter, Core Rulebook.
Go to the top of the page
 
+Quote Post
sabs
post May 26 2011, 04:17 PM
Post #3


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



I can give you a basic walkthrough for Hacking a Node:
Assuming no Data Bombs everywhere.

If Node is Hidden:
Electronic Warfare + Scan threshold (4, complex action), unless you're doing a general scan, in which case it's (15, combat turn)

You have now found the Node:
1) Computer+Analyze, each hit gives you a piece of information: System Rating, Firewall Rating, Response, Encrypted (y/n), Data Bomb on Gateway (y/n), IC watching Node gateway
2a) slow probe: Hacking+exploit (system+firewall+level of access modifier, 1 hour)
2b) Hacking on the Fly: Hacking+exploit(system+firewall+level of access modifier, complex action), vs System+firewall(Your Stealth Rating, complex action)
3) Log in: System+firewall(stealth rating), Any IC does Agent+Analyze(stealth rating)
4) Computer+Analyze, each hit gives you information on the system, including # of icons subscribed, gateways to other nodes, etc.
5) datasearch+browse
6) EC+decrypt(Encryption Rating, combat turn)
7) Do what you came here to do
8) computer+edit to modify logs
9) log out
Go to the top of the page
 
+Quote Post
James McMurray
post May 26 2011, 04:22 PM
Post #4


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



Thanks!
Go to the top of the page
 
+Quote Post
Wolfgar
post May 26 2011, 06:08 PM
Post #5


Target
*

Group: Members
Posts: 63
Joined: 5-February 11
From: Raleigh, NC
Member No.: 21,340



Hey, thanks for the list, but what's step 5 for? Is it to single out a specific icon you're looking for?
Go to the top of the page
 
+Quote Post
Tyro
post May 26 2011, 06:13 PM
Post #6


Shooting Target
****

Group: Members
Posts: 1,768
Joined: 31-October 08
From: Redmond (Yes, really)
Member No.: 16,558



Well put.
Go to the top of the page
 
+Quote Post
sabs
post May 26 2011, 07:52 PM
Post #7


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



single icon, file, pay data, what ever.
Go to the top of the page
 
+Quote Post
capt.pantsless
post May 26 2011, 07:57 PM
Post #8


Moving Target
**

Group: Members
Posts: 206
Joined: 9-September 10
From: Minneapolis, MN
Member No.: 19,032



QUOTE (Wolfgar @ May 26 2011, 01:08 PM) *
Hey, thanks for the list, but what's step 5 for? Is it to single out a specific icon you're looking for?



That way, when the Black-IC software queries you, you can say:

"Oh, sorry, I was just browsing!"


Bad humor aside, thanks for the quick writeup. Quick and complete examples is exactly the kinda thing is what they need more of in complicated, alternate-setting games like SR.
Go to the top of the page
 
+Quote Post
sabs
post May 26 2011, 08:03 PM
Post #9


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



It gets way more complicated when there's sculpting, and actual descriptions, and how your Gm handles Reality filters.

It also gets more complicated once IC notice you, and you realize there's no way to turn off an alarm. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Udoshi
post May 27 2011, 03:20 AM
Post #10


Runner
******

Group: Members
Posts: 2,782
Joined: 28-August 09
Member No.: 17,566



Minor nitpick on sabs: You have to decrypt before you hack.

Additionally, nodes which are running stealth can be hidden themselves, requiring an analyze test to find. (the core book mentions node being able to hide with firewall+stealth)
Go to the top of the page
 
+Quote Post
sabs
post May 27 2011, 04:06 AM
Post #11


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



That depends what's encrypted.
You only have to decrypt if the entire node is encrypted
WHich it isn't always.
Go to the top of the page
 
+Quote Post
Prime Mover
post May 27 2011, 05:23 AM
Post #12


Shooting Target
****

Group: Dumpshocked
Posts: 1,755
Joined: 5-September 06
From: UCAS
Member No.: 9,313



Heres a link showing rules as they interact with some fiction from sr4a.
http://forums.dumpshock.com/index.php?s=&a...st&p=804857


Go to the top of the page
 
+Quote Post
Aaron
post May 27 2011, 10:31 AM
Post #13


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



And here's an audio demo some friends and I made a few years ago: http://pavao.org/aud/HackingDemo.mp3
Go to the top of the page
 
+Quote Post
BishopMcQ
post May 27 2011, 02:47 PM
Post #14


The back-up plan
**********

Group: Retired Admins
Posts: 8,423
Joined: 15-January 03
From: San Diego
Member No.: 3,910



Runner's Toolkit has a hacking scene in the Anatomy of a Shadowrun
Go to the top of the page
 
+Quote Post
Nath
post May 28 2011, 09:26 PM
Post #15


Shooting Target
****

Group: Members
Posts: 1,756
Joined: 11-December 02
From: France
Member No.: 3,723



QUOTE (sabs @ May 26 2011, 06:17 PM) *
2a) slow probe: Hacking+exploit (system+firewall+level of access modifier, 1 hour)
2b) Hacking on the Fly: Hacking+exploit(system+firewall+level of access modifier, complex action), vs System+firewall(Your Stealth Rating, complex action)
3) Log in: System+firewall(stealth rating), Any IC does Agent+Analyze(stealth rating)
Slow Probe is an Extended Test Exploit+Hacking (System+Firewall+Access level, 1 hour). When entering the node, the node gets a free Test Analyze+Firewall (Stealth).

Hacking on the Fly is an Extended Test Exploit+Hacking (System+Firewall+Access level, Complex Action). When making a test, the node gets a free Extended Test Analyze+Firewall (Stealth, hacker making a test).

When logging in, any IC can possibly spend a Simple Action to make a Matrix Perception Test. If you're running a Stealth program, that's an Opposed Test, Analyze+IC Rating versus Stealth+Hacking. With one net hit, the IC can get the programs run by your persona, and should trigger an alert if Stealth or Exploit runs.
Go to the top of the page
 
+Quote Post
LurkerOutThere
post May 29 2011, 05:34 AM
Post #16


Runner
******

Group: Dumpshocked
Posts: 2,946
Joined: 1-June 09
From: Omaha
Member No.: 17,234



Also for completions sake it should be mentioned that the one hour threshhold is only relevant to probing if your in full VR. Otherwise it's one day. Otherwise bravo for the brief summary.
Go to the top of the page
 
+Quote Post
Falconer
post May 30 2011, 04:46 AM
Post #17


Neophyte Runner
*****

Group: Validating
Posts: 2,283
Joined: 12-October 07
Member No.: 13,662



Two minor nitpicks...

The threshhold is 4 to find a hidden known in a known geographic location. IE: the face sitting across from you... trying to detect if he's running a hidden wireless node on his person/pan.


The threshhold for the area version is actually 15+... a minimum of 15... depending on exactly what and how much the GM should feel free to make that number much higher. For example... if you have a signal rating 8 device... trying to catalog all devices within 10 miles, 15 more than a little low. Also never addressed is does that detect transient things... like the drone which was in the area when you started but left by the time you finished or vice versa.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 27th April 2024 - 05:24 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.