Hacker walkthrough, is there one? |
Hacker walkthrough, is there one? |
May 26 2011, 03:59 PM
Post
#1
|
|
Great Dragon Group: Members Posts: 5,430 Joined: 10-January 05 From: Fort Worth, Texas Member No.: 6,957 |
Is there a simplified walkthrough of a hack on a node? The runner's toolkit has an entire run walkthrough, but their hacker is a technomancer and I'm just wanting to learn the basic stuff.
|
|
|
May 26 2011, 04:10 PM
Post
#2
|
|
Runner Group: Dumpshocked Posts: 2,801 Joined: 2-September 09 From: Moscow, Russia Member No.: 17,589 |
Yes. Hacking subchapter in the Wireless World chapter, Core Rulebook.
|
|
|
May 26 2011, 04:17 PM
Post
#3
|
|
Prime Runner Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 |
I can give you a basic walkthrough for Hacking a Node:
Assuming no Data Bombs everywhere. If Node is Hidden: Electronic Warfare + Scan threshold (4, complex action), unless you're doing a general scan, in which case it's (15, combat turn) You have now found the Node: 1) Computer+Analyze, each hit gives you a piece of information: System Rating, Firewall Rating, Response, Encrypted (y/n), Data Bomb on Gateway (y/n), IC watching Node gateway 2a) slow probe: Hacking+exploit (system+firewall+level of access modifier, 1 hour) 2b) Hacking on the Fly: Hacking+exploit(system+firewall+level of access modifier, complex action), vs System+firewall(Your Stealth Rating, complex action) 3) Log in: System+firewall(stealth rating), Any IC does Agent+Analyze(stealth rating) 4) Computer+Analyze, each hit gives you information on the system, including # of icons subscribed, gateways to other nodes, etc. 5) datasearch+browse 6) EC+decrypt(Encryption Rating, combat turn) 7) Do what you came here to do 8) computer+edit to modify logs 9) log out |
|
|
May 26 2011, 04:22 PM
Post
#4
|
|
Great Dragon Group: Members Posts: 5,430 Joined: 10-January 05 From: Fort Worth, Texas Member No.: 6,957 |
Thanks!
|
|
|
May 26 2011, 06:08 PM
Post
#5
|
|
Target Group: Members Posts: 63 Joined: 5-February 11 From: Raleigh, NC Member No.: 21,340 |
Hey, thanks for the list, but what's step 5 for? Is it to single out a specific icon you're looking for?
|
|
|
May 26 2011, 06:13 PM
Post
#6
|
|
Shooting Target Group: Members Posts: 1,768 Joined: 31-October 08 From: Redmond (Yes, really) Member No.: 16,558 |
Well put.
|
|
|
May 26 2011, 07:52 PM
Post
#7
|
|
Prime Runner Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 |
single icon, file, pay data, what ever.
|
|
|
May 26 2011, 07:57 PM
Post
#8
|
|
Moving Target Group: Members Posts: 206 Joined: 9-September 10 From: Minneapolis, MN Member No.: 19,032 |
Hey, thanks for the list, but what's step 5 for? Is it to single out a specific icon you're looking for? That way, when the Black-IC software queries you, you can say: "Oh, sorry, I was just browsing!" Bad humor aside, thanks for the quick writeup. Quick and complete examples is exactly the kinda thing is what they need more of in complicated, alternate-setting games like SR. |
|
|
May 26 2011, 08:03 PM
Post
#9
|
|
Prime Runner Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 |
It gets way more complicated when there's sculpting, and actual descriptions, and how your Gm handles Reality filters.
It also gets more complicated once IC notice you, and you realize there's no way to turn off an alarm. (IMG:style_emoticons/default/smile.gif) |
|
|
May 27 2011, 03:20 AM
Post
#10
|
|
Runner Group: Members Posts: 2,782 Joined: 28-August 09 Member No.: 17,566 |
Minor nitpick on sabs: You have to decrypt before you hack.
Additionally, nodes which are running stealth can be hidden themselves, requiring an analyze test to find. (the core book mentions node being able to hide with firewall+stealth) |
|
|
May 27 2011, 04:06 AM
Post
#11
|
|
Prime Runner Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 |
That depends what's encrypted.
You only have to decrypt if the entire node is encrypted WHich it isn't always. |
|
|
May 27 2011, 05:23 AM
Post
#12
|
|
Shooting Target Group: Dumpshocked Posts: 1,755 Joined: 5-September 06 From: UCAS Member No.: 9,313 |
Heres a link showing rules as they interact with some fiction from sr4a.
http://forums.dumpshock.com/index.php?s=&a...st&p=804857 |
|
|
May 27 2011, 10:31 AM
Post
#13
|
|
Mr. Johnson Group: Dumpshocked Posts: 3,148 Joined: 27-February 06 From: UCAS Member No.: 8,314 |
And here's an audio demo some friends and I made a few years ago: http://pavao.org/aud/HackingDemo.mp3
|
|
|
May 27 2011, 02:47 PM
Post
#14
|
|
The back-up plan Group: Retired Admins Posts: 8,423 Joined: 15-January 03 From: San Diego Member No.: 3,910 |
Runner's Toolkit has a hacking scene in the Anatomy of a Shadowrun
|
|
|
May 28 2011, 09:26 PM
Post
#15
|
|
Shooting Target Group: Members Posts: 1,756 Joined: 11-December 02 From: France Member No.: 3,723 |
2a) slow probe: Hacking+exploit (system+firewall+level of access modifier, 1 hour) Slow Probe is an Extended Test Exploit+Hacking (System+Firewall+Access level, 1 hour). When entering the node, the node gets a free Test Analyze+Firewall (Stealth).2b) Hacking on the Fly: Hacking+exploit(system+firewall+level of access modifier, complex action), vs System+firewall(Your Stealth Rating, complex action) 3) Log in: System+firewall(stealth rating), Any IC does Agent+Analyze(stealth rating) Hacking on the Fly is an Extended Test Exploit+Hacking (System+Firewall+Access level, Complex Action). When making a test, the node gets a free Extended Test Analyze+Firewall (Stealth, hacker making a test). When logging in, any IC can possibly spend a Simple Action to make a Matrix Perception Test. If you're running a Stealth program, that's an Opposed Test, Analyze+IC Rating versus Stealth+Hacking. With one net hit, the IC can get the programs run by your persona, and should trigger an alert if Stealth or Exploit runs. |
|
|
May 29 2011, 05:34 AM
Post
#16
|
|
Runner Group: Dumpshocked Posts: 2,946 Joined: 1-June 09 From: Omaha Member No.: 17,234 |
Also for completions sake it should be mentioned that the one hour threshhold is only relevant to probing if your in full VR. Otherwise it's one day. Otherwise bravo for the brief summary.
|
|
|
May 30 2011, 04:46 AM
Post
#17
|
|
Neophyte Runner Group: Validating Posts: 2,283 Joined: 12-October 07 Member No.: 13,662 |
Two minor nitpicks...
The threshhold is 4 to find a hidden known in a known geographic location. IE: the face sitting across from you... trying to detect if he's running a hidden wireless node on his person/pan. The threshhold for the area version is actually 15+... a minimum of 15... depending on exactly what and how much the GM should feel free to make that number much higher. For example... if you have a signal rating 8 device... trying to catalog all devices within 10 miles, 15 more than a little low. Also never addressed is does that detect transient things... like the drone which was in the area when you started but left by the time you finished or vice versa. |
|
|
Lo-Fi Version | Time is now: 27th April 2024 - 05:24 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.