Spoofing vs Slaved Commlink |
Spoofing vs Slaved Commlink |
Jun 1 2011, 10:48 PM
Post
#1
|
|
Shooting Target Group: Members Posts: 1,632 Joined: 26-February 02 From: Portland Oregon, USA Member No.: 1,304 |
OK, so my team, including myself, has all of our commlinks slaved to my external commlink running battle-tac.
The street sam has skinlink on and all cyberware set to DNI only. Meaning that his cyberware only accepts commands from his commlink, and his commlink only accepts commands from my commlink. The only way he can be messed with wirelessly is to hack the master commlink, right? As in, spoof doesn't work against his gear, because it's secured, and you can't get to his commlink without going through my commlink. Sounds too simple. |
|
|
Jun 1 2011, 10:54 PM
Post
#2
|
|
Moving Target Group: Members Posts: 433 Joined: 12-May 11 Member No.: 29,932 |
A only accepts commands from B, and B only accepts commands from C. If you spoof to look like C, then B accepts commands because it thinks the spoof is C. Also, chaining the slaving is pointless, because if a hacker gets control of C or spoofs C, it commands A just as easily as it commands B.
|
|
|
Jun 1 2011, 11:08 PM
Post
#3
|
|
Running Target Group: Members Posts: 1,373 Joined: 14-January 10 From: Stuttgart, Germany Member No.: 18,036 |
slaved devices are not unhackable or unspoofable afaik. slaving just gives a negative dice modifier
|
|
|
Jun 1 2011, 11:14 PM
Post
#4
|
|
Moving Target Group: Members Posts: 433 Joined: 12-May 11 Member No.: 29,932 |
slaved devices are not unhackable or unspoofable afaik. slaving just gives a negative dice modifier They are unhackable actually. They have to be spoofed. Well, unless you can get a direct physical line to the device in question, and even then it throws on a serious penalty. |
|
|
Jun 1 2011, 11:15 PM
Post
#5
|
|
Shooting Target Group: Members Posts: 1,632 Joined: 26-February 02 From: Portland Oregon, USA Member No.: 1,304 |
A only accepts commands from B, and B only accepts commands from C. If you spoof to look like C, then B accepts commands because it thinks the spoof is C. Also, chaining the slaving is pointless, because if a hacker gets control of C or spoofs C, it commands A just as easily as it commands B. I was under the impression that you couldn't spoof commands to commlinks. It doesn't have a pilot rating. Is it considered a peripheral device? |
|
|
Jun 1 2011, 11:21 PM
Post
#6
|
|
Moving Target Group: Members Posts: 433 Joined: 12-May 11 Member No.: 29,932 |
|
|
|
Jun 1 2011, 11:22 PM
Post
#7
|
|
Shooting Target Group: Members Posts: 1,632 Joined: 26-February 02 From: Portland Oregon, USA Member No.: 1,304 |
Sorry, I edited before you answered (IMG:style_emoticons/default/smile.gif)
|
|
|
Jun 1 2011, 11:25 PM
Post
#8
|
|
Moving Target Group: Members Posts: 772 Joined: 12-December 07 From: Fort Worth, Texas Member No.: 14,589 |
One can Spoof commands to his commlink if they have your Access ID, something they can get with a Detect Wireless Signal check.
The downside here is that you can't spoof your Access ID because, if you do, the other commlinks won't be able to do anything. They do all their stuff through your commlink and, if they no longer recognize your commlink(because it's running a different Access ID) they aren't receiving or giving any commands to anything they recognize. The other drawback is that your subscription limit is severely clogged up with all the team's commlinks. It also means that if someone gets into your commlink, they have access to everybody on the team and don't have to hack one person at a time. As with anything, when you increase security, you decrees access. Same goes for physical and Astral security. |
|
|
Jun 1 2011, 11:25 PM
Post
#9
|
|
Running Target Group: Members Posts: 1,373 Joined: 14-January 10 From: Stuttgart, Germany Member No.: 18,036 |
I was under the impression that you couldn't spoof commands to commlinks. It doesn't have a pilot rating. Is it considered a peripheral device? everything's a node. and Unwired p55 says the slave is a node and can be spoofed. and there isn't even the modifier I believed there was. So if B is slaved to A, I can spoof A's ID. If B is a commlink I can tell it to shut down/restart/play AR-Porn/etc |
|
|
Jun 1 2011, 11:25 PM
Post
#10
|
|
Target Group: Members Posts: 37 Joined: 22-December 08 Member No.: 16,704 |
Unwired, pg55 under "Slaving".
QUOTE ...Hackers have three options when faced with a slaved node. First, they can hack in directly to the slave with an additional threshold modifier of +2, though this requires a physical (wired) connection to the device. Second, they can hack the master node (thus gaining access to the slaved node—and any other slaves— as well), though this node is usually more secure. Third, they can spoof the access ID of the master node and then spoof commands to the slave. And one more thing: DNI is a device-to-brain interface. The samurai dont need to connect his cyber to any commlink. |
|
|
Jun 1 2011, 11:28 PM
Post
#11
|
|
Moving Target Group: Members Posts: 433 Joined: 12-May 11 Member No.: 29,932 |
QUOTE (Unwired p55) Hackers have three options when faced with a slaved node.
First, they can hack in directly to the slave with an additional threshold modifier of +2, though this requires a physical (wired) connection to the device. Second, they can hack the master node (thus gaining access to the slaved node—and any other slaves— as well), though this node is usually more secure. Third, they can spoof the access ID of the master node and then spoof commands to the slave. |
|
|
Jun 1 2011, 11:30 PM
Post
#12
|
|
Shooting Target Group: Members Posts: 1,632 Joined: 26-February 02 From: Portland Oregon, USA Member No.: 1,304 |
My impression is, to spoof a command, you have to be sending the command to something that accepts commands. The pilot in a drone, or the equivalent in a coffee maker or or taxi. If there isn't a pilot type program running, you can't tell it what to do, so you can't send it a spoofed command.
Example: You can't spoof a command to a gun. There's nothing there to accept the command. You can spoof a command to a smartlink, it's got just enough of a brain to accept commands like, full-auto or eject clip. I don't believe a commlink has anything built in to accept and act on commands, but I'd be happy if some one showed me where I'm wrong. |
|
|
Jun 1 2011, 11:32 PM
Post
#13
|
|
Moving Target Group: Members Posts: 433 Joined: 12-May 11 Member No.: 29,932 |
My impression is, to spoof a command, you have to be sending the command to something that accepts commands. The pilot in a drone, or the equivalent in a coffee maker or or taxi. If there isn't a pilot type program running, you can't tell it what to do, so you can't send it a spoofed command. Example: You can't spoof a command to a gun. There's nothing there to accept the command. You can spoof a command to a smartlink, it's got just enough of a brain to accept commands like, full-auto or eject clip. I don't believe a commlink has anything built in to accept and act on commands, but I'd be happy if some one showed me where I'm wrong. Everything in a commlink is built to accept and act on commands. Shut down, load attack program, give admin privilage to access ID 4372469, change master to ID 4372469, etc. |
|
|
Jun 1 2011, 11:33 PM
Post
#14
|
|
Shooting Target Group: Members Posts: 1,632 Joined: 26-February 02 From: Portland Oregon, USA Member No.: 1,304 |
From pg. 236 BBB
QUOTE The target of a spoof attempt must either have a Pilot rating or be
a peripheral device. Most often you will spoof a drone or an agent, but you may also use spoof to do things like unlock doors, get free cab rides, and make the McHugh’s autocooker prepare your soyburger exactly the way you like it. |
|
|
Jun 1 2011, 11:39 PM
Post
#15
|
|
Moving Target Group: Members Posts: 772 Joined: 12-December 07 From: Fort Worth, Texas Member No.: 14,589 |
You are turning the commlink to a peripheral device by making it slaved.
|
|
|
Jun 1 2011, 11:44 PM
Post
#16
|
|
Moving Target Group: Members Posts: 433 Joined: 12-May 11 Member No.: 29,932 |
Well, 'Peripheral device' isn't defined anywhere in the book, other than mentioning a couple of particular examples. I take 'peripheral device' to mean 'anything capable of accepting and acting on electronic commands', which would include commlinks along with everything on your list. I think the reason that it mentions pilot/agent in particular is that they aren't devices, they're computer constructs, and so wouldn't be affected by spoof if it only said devices.
However, regardless of trying to define peripheral device, as myself and three other people have quoted, the rules say very directly that spoof is an acceptable means of defeating slaving. This could mean that a commlink is a peripheral device (Which I believe to be the case) or it could mean that a slaved commlink is a particular exception of some kind. FYI I define peripheral device as any device that is connected (or could be connected) to another device in some way. |
|
|
Jun 1 2011, 11:48 PM
Post
#17
|
|
Shooting Target Group: Members Posts: 1,632 Joined: 26-February 02 From: Portland Oregon, USA Member No.: 1,304 |
So....having cyberware is stupid?
If any jackass with a rating 3 commlink and an off the rack agent can completely shut you down, what's the point? |
|
|
Jun 1 2011, 11:54 PM
Post
#18
|
|
Moving Target Group: Members Posts: 772 Joined: 12-December 07 From: Fort Worth, Texas Member No.: 14,589 |
You need to check out Unwired. It gives a great many detail on things like this.
Much of your cyberware can be made without wireless. Spoofing also means that you are only giving one command per action, as opposed to hacking, in which case you have complete access to the device. You also have to be within mutual signal range of the device you are spoofing. Most cyberware, when it is wireless, has a Signal range of 0. That being said, having cyberware makes you vulnerable to hackers. In this way hackers are not toothless in combat. |
|
|
Jun 2 2011, 12:08 AM
Post
#19
|
|
Moving Target Group: Members Posts: 433 Joined: 12-May 11 Member No.: 29,932 |
Mutual signal range includes any and all devices that you can bounce the connection off of, it doesn't have to be a direct mutual signal range.
It isn't bad to have cyberware though, all you have to do is turn off the wireless when you don't actively need its wireless to be on (such as running a diagnoses every so often). Also, while you can only spoof one command at a time, your first command can be 'accept me as the new master' and then you have full admin access. So slaving a device can be potentially dangerous. Edit: Well, what I said about mutual signal range isn't quite right, but there are -very- few applications in which routing can't accomplish the same thing as mutual signal range, and spoofing access to someone's cyberware isn't one of those exceptions. |
|
|
Jun 2 2011, 12:22 AM
Post
#20
|
|
Great Dragon Group: Members Posts: 5,430 Joined: 10-January 05 From: Fort Worth, Texas Member No.: 6,957 |
Well, 'Peripheral device' isn't defined anywhere in the book, other than mentioning a couple of particular examples. It's actually defined pretty clearly. A commlink is most definitely not a peripheral device. QUOTE (SR4A core, p. 221) A peripheral device is a Matrix-capable appliance or piece of equipment that is wireless (or in some cases wired) but is not intended to be used for full-blown Matrix interfacing and processing. A commlink is a device intended for matrix interfacing and processing, ergo it ain't one. |
|
|
Jun 2 2011, 12:41 AM
Post
#21
|
|
Old Man Jones Group: Dumpshocked Posts: 4,415 Joined: 26-February 02 From: New York Member No.: 1,699 |
Basically the only really effective way to not be hacked is not have data connections to outside your PAN.
-k |
|
|
Jun 2 2011, 12:41 AM
Post
#22
|
|
Moving Target Group: Members Posts: 772 Joined: 12-December 07 From: Fort Worth, Texas Member No.: 14,589 |
Also, while you can only spoof one command at a time, your first command can be 'accept me as the new master' and then you have full admin access. So slaving a device can be potentially dangerous Only if the Access ID you are spoofing has admin privileges. Even then "Accept me as the new master" is a bit of a misnomer. The first thing you would need to do is delete the enslavement. Then you would need to hack in and create a legit account for yourself, probably an admin account. Once you have a legit admin account you can slave the device to yourself. This cannot be done in one command. You can't just give the command "Be enslaved to X Access ID" because X Access ID doesn't have an account. |
|
|
Jun 2 2011, 12:43 AM
Post
#23
|
|
Moving Target Group: Members Posts: 772 Joined: 12-December 07 From: Fort Worth, Texas Member No.: 14,589 |
It's actually defined pretty clearly. A commlink is most definitely not a peripheral device. A commlink is a device intended for matrix interfacing and processing, ergo it ain't one. Unwired more clearly defines what you can and cannot Spoof that overrides the BBB. QUOTE (Unwired p.98) As described under Spoof Command, p. 224, SR4, a
hacker can use Spoof software to send commands to a target that look like they were sent by someone with control or access privileges. This trick may be used to falsify commands to drones, agents, sprites (technomancers only), electronic devices, and slaved nodes. |
|
|
Jun 2 2011, 12:45 AM
Post
#24
|
|
Great Dragon Group: Members Posts: 5,430 Joined: 10-January 05 From: Fort Worth, Texas Member No.: 6,957 |
Cool. I was responding specifically to the claim that peripheral devices aren't defined (hence my only quoting that portion).
|
|
|
Jun 2 2011, 12:50 AM
Post
#25
|
|
Moving Target Group: Members Posts: 772 Joined: 12-December 07 From: Fort Worth, Texas Member No.: 14,589 |
Yeah, Peripheral Nodes are clearly defined on p. 48 of Unwired.
|
|
|
Lo-Fi Version | Time is now: 5th February 2025 - 10:55 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.