IPB

Welcome Guest ( Log In | Register )

2 Pages V   1 2 >  
Reply to this topicStart new topic
> Drone Hacking
sgtbarnesKY
post Jul 31 2011, 06:38 PM
Post #1


Target
*

Group: Members
Posts: 27
Joined: 17-June 10
Member No.: 18,719



If a technomancer/sprite hacked into a normal rigger/hacker's drone, and said drone wasn't running analyze, and the Technomancer/sprite had stealth of coarse. Would the Hacker/Rigger be alerted to the new subscription on his/her drone, or would the Techno/sprite be able to do so without being caught by the drones owner?

That question might not make a lot of sence, but in a nutshell. My team encountered a bound and gagged prisoner, the person they are sent to retreive and kill in a very wet manner. They left said person bound and gagged, took a few hours to search the compound they had just liberated from the opposition. Their team hacker had multiple drones all armed and doing overwatch to provide for a Tacnet. The said bound prisoner is a technomancer and they left them concious and able to listen in on their conversation about killing said Techno. Now is it fair to say that the technomancer with the help of their sprites, hack into the drones and use them to attack the team without the Hacker's knowledge, until they deleted their subscribtion and targeted the team members? Would the Hacker have been alerted to the Techno's/sprited hacking attempt before hand, and the droned where not running analyze or any detection program. Would the 2nd subscription have alerted the Hacker? I would think not, but I want to be fair to the hacker.
Go to the top of the page
 
+Quote Post
HunterHerne
post Jul 31 2011, 06:45 PM
Post #2


Running Target
***

Group: Members
Posts: 1,019
Joined: 10-November 10
From: Annapolis Valley, Nova Scotia
Member No.: 19,166



If the hacker left his drones that exposed, knowing there was a techno, he deserves to get hacked. If the techno/sprite is using stealth, then they only thing the hacker or any IC would notice is a new Icon inside the VR, and have to analyze it to know more. That said, the Firewall should get a chance to recognize the intrusion as well, even if it has a lower chance then firewall+analyze.

This happened similarily to a player I had. Forgot to run the drone in Hidden mode, got hacked and ignored the Civil war soldier inside the node shooting him, until he got dumpshocked. It was not a smart move, at all.
Go to the top of the page
 
+Quote Post
Miri
post Aug 1 2011, 12:29 AM
Post #3


Moving Target
**

Group: Members
Posts: 271
Joined: 5-July 11
From: Firebase Zulu
Member No.: 32,769



And they left him there for "a few hours" so the bound and gagged TM could have threaded Exploit up, probed the target for a while, then threaded Stealth up for his login.
Go to the top of the page
 
+Quote Post
DeathStrobe
post Aug 1 2011, 01:36 AM
Post #4


Moving Target
**

Group: Members
Posts: 576
Joined: 6-May 10
From: Front Range Free Zone
Member No.: 18,558



The whole point of the stealth program is to make your icon look like something that belongs to the node. So you'll look like any other thing in the VR.

Now however, the firewall may have seen the sprite. The firewall gets to roll firewall + analyze every time the sprite (or hacker) tries to exploite in (assuming your hacking on the fly) with a threshold equal to the sprite's (or whom ever is hacking's) stealth program. So if the firewall goes off, alarms go off, and the firewall suddenly gets a +4. The person can keep trying to hack in, but it'd be pretty obvious who they are when they enter.

Assuming the sprite made it past the firewall. The owner of the node would need to get a successful analysis on it to notice the intruder. Unless the intruder starts attacking the owner. Or maybe if he starts to notice files being edited or something...maybe then... Or the owner could have an agent or ice always going around analyzing every icon to see if it belongs. But once you're in a node, you're..."kind of" safe to poke around.
Go to the top of the page
 
+Quote Post
Mardrax
post Aug 1 2011, 02:02 AM
Post #5


Running Target
***

Group: Members
Posts: 1,083
Joined: 13-December 10
From: Rotterdam, The Netherlands
Member No.: 19,228



Definitely. Sounds both fair and fun.
Especially if the rigger is a hackers as well, he should have known better.

Be sure to have the techno call in a Registered Fault sprite patrol one or two of the drones if you think they can take the pressure for a bit. Maybe even be as audacious as to copy a pirated copy of Analyze off his fingernail/tooth compartment data storage onto the drones. And some IC if they can really take the pressure.

Oh, the pain of choosing between duking it out as long as it takes to get them back, and shooting the drones outright. I like it!
Go to the top of the page
 
+Quote Post
sgtbarnesKY
post Aug 1 2011, 02:14 AM
Post #6


Target
*

Group: Members
Posts: 27
Joined: 17-June 10
Member No.: 18,719



Unfortunatly for my Hacker he did not have analyze loaded onto his drones so it was just the Firewall the techno had to by-pass. My hacker was upset that he wasn't able to detect the techno on the drones node before I had the drones targert the team. He fealt he should have been alerted to the techno's presence in his drones, but with twop hours to set up the drones the techno had all the time they needed to hack in and gain control of the nodes. Plus, the Techno had 5 points of edge to spend on hacking/threading. The hacker left his guard done with his drones and the techno took advantage
Go to the top of the page
 
+Quote Post
HunterHerne
post Aug 1 2011, 11:30 AM
Post #7


Running Target
***

Group: Members
Posts: 1,019
Joined: 10-November 10
From: Annapolis Valley, Nova Scotia
Member No.: 19,166



QUOTE (sgtbarnesKY @ Jul 31 2011, 11:14 PM) *
Unfortunatly for my Hacker he did not have analyze loaded onto his drones so it was just the Firewall the techno had to by-pass. My hacker was upset that he wasn't able to detect the techno on the drones node before I had the drones targert the team. He fealt he should have been alerted to the techno's presence in his drones, but with twop hours to set up the drones the techno had all the time they needed to hack in and gain control of the nodes. Plus, the Techno had 5 points of edge to spend on hacking/threading. The hacker left his guard done with his drones and the techno took advantage


Which is how it should be. If he wants to complain, remind him they left the techno conscious.
Go to the top of the page
 
+Quote Post
Miri
post Aug 1 2011, 02:06 PM
Post #8


Moving Target
**

Group: Members
Posts: 271
Joined: 5-July 11
From: Firebase Zulu
Member No.: 32,769



QUOTE (HunterHerne @ Aug 1 2011, 05:30 AM) *
Which is how it should be. If he wants to complain, remind him they left the techno conscious.


The OP doesn't say if the PC team knew their prisoner was a TM. One of my tablemates playing the supercybered street sam would have had serviced him the moment we had him secure and pumped all the info we could get out of him, none of this holding him for a couple of hours to deal with later.
Go to the top of the page
 
+Quote Post
Warlordtheft
post Aug 1 2011, 02:42 PM
Post #9


Neophyte Runner
*****

Group: Members
Posts: 2,328
Joined: 2-April 07
From: The Center of the Universe
Member No.: 11,360



Your hacker was not following standard matrix/rigging operating procedures:

1. All nodes are hidden, this includes the drones, smartlinks, as well as commlinks. In high secure areas you have one commlink (usually a disposable one) public with the ID of one of your FAKE IDs.

2.All communications go through the most secure node in the party (Usually the hacker/rigger's). This includes the drones. This means for the Techno in your situation to hack the drones must go through the Hackers commlink to get access to the drone. The Tecno must de-slave the drone from the hacker's/commlink.

3.All nodes shout have an agent with attack and analyze.

4.All nodes should be encrypted and or data bombed.

If he is not doing these things, he should probably reread the matrix section....also I find that it helps for persons new to hacking that he has program ratings of the same value for most things. It helps in determining the number of dice rolled. Also--programs can be bought once and loaded on multiple nodes (see the Archetypes and not one of them has multiple programs of the same kind.
Go to the top of the page
 
+Quote Post
Mardrax
post Aug 1 2011, 02:57 PM
Post #10


Running Target
***

Group: Members
Posts: 1,083
Joined: 13-December 10
From: Rotterdam, The Netherlands
Member No.: 19,228



QUOTE (Warlordtheft @ Aug 1 2011, 04:42 PM) *
Also--programs can be bought once and loaded on multiple nodes (see the Archetypes and not one of them has multiple programs of the same kind.

Not unless you remove the copy protection first, which is described in SR4A somewhere. Unwired states programs without copy protection start degrading at a rate of one point per two months, or one month for hacking programs, unless you take the time to acquire or code patches.
Go to the top of the page
 
+Quote Post
Mayhem_2006
post Aug 1 2011, 03:25 PM
Post #11


Moving Target
**

Group: Members
Posts: 245
Joined: 17-August 10
Member No.: 18,943



QUOTE (Mardrax @ Aug 1 2011, 03:57 PM) *
Not unless you remove the copy protection first, which is described in SR4A somewhere. Unwired states programs without copy protection start degrading at a rate of one point per two months, or one month for hacking programs, unless you take the time to acquire or code patches.


Well, assuming you bought the original legitimately, that shouldn't be an issue.
Go to the top of the page
 
+Quote Post
Warlordtheft
post Aug 1 2011, 03:33 PM
Post #12


Neophyte Runner
*****

Group: Members
Posts: 2,328
Joined: 2-April 07
From: The Center of the Universe
Member No.: 11,360



QUOTE (Mayhem_2006 @ Aug 1 2011, 11:25 AM) *
Well, assuming you bought the original legitimately, that shouldn't be an issue.



And I assume that the Hacker PC has all these things cracked from the getgo. Also I do not use the program degredation rules, hacking is complicated enough as it is--my assumption there is that it is one of those things automatically done during downtime.

Essentially it is NERPS (Non-Essential Roleplaying Stuf).

(IMG:style_emoticons/default/grinbig.gif)
Go to the top of the page
 
+Quote Post
Mardrax
post Aug 1 2011, 04:00 PM
Post #13


Running Target
***

Group: Members
Posts: 1,083
Joined: 13-December 10
From: Rotterdam, The Netherlands
Member No.: 19,228



QUOTE (Mayhem_2006 @ Aug 1 2011, 05:25 PM) *
Well, assuming you bought the original legitimately, that shouldn't be an issue.

Indeed. Those, however, are registered to the SIN you bought them with. If you would ever have to burn this SIN, the programs should start degrading.
Also, they significantly increase the difficulty of your hackjobs, and the danger to yourself, since the Threshold to track you is lowered by 1 for each legal (Registered) program, and the threshold to purge the log of your activities is increased by 1 for every registered program.

QUOTE (Warlordtheft @ Aug 1 2011, 05:33 PM) *
And I assume that the Hacker PC has all these things cracked from the getgo. Also I do not use the program degredation rules, hacking is complicated enough as it is--my assumption there is that it is one of those things automatically done during downtime.

Essentially it is NERPS (Non-Essential Roleplaying Stuf).

Having them cracked, sure.
Program degradation is what offsets the cheap initial cost of pirated programs vs the steep initial cost of legal programs. It's not at all complicated to keep track of. You just sit down as GM and say it's going to cost someone an x ammount of money per month to keep them patched, and factor that into lifestyle cost. Or you're assume he's buying successes during downtime coding to keep them patched himself, and have a little calculation on how much time this will cost him each month. Mind that this can be a lot.
Because 'something for nothing' is something not everyone will let fly.
Go to the top of the page
 
+Quote Post
Warlordtheft
post Aug 1 2011, 04:10 PM
Post #14


Neophyte Runner
*****

Group: Members
Posts: 2,328
Joined: 2-April 07
From: The Center of the Universe
Member No.: 11,360



How I handle it may not be exactly RAW, but it simplifies both the players and GM's bookkeeping. It doesn't take or add to the story in any significant way I find. However they do pay standard book prices for the programs at chracter gen.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Aug 1 2011, 04:17 PM
Post #15


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Warlordtheft @ Aug 1 2011, 09:10 AM) *
However they do pay standard book prices for the programs at chracter gen.


As they Should... (IMG:style_emoticons/default/wobble.gif)
Go to the top of the page
 
+Quote Post
sgtbarnesKY
post Aug 1 2011, 06:55 PM
Post #16


Target
*

Group: Members
Posts: 27
Joined: 17-June 10
Member No.: 18,719



Unfortunatly the team mage only got a 4 on his assensing test so they didn't know the bound and gagged target was a technomancer. As for cracked programs/degredation, I ignore those rules. Now I did have my hacker pay a pretty penny for his programs, but I don't care about degredation rules as stated before it's NERPS. My hackers DP is high enough that is a non issue during downtime
Go to the top of the page
 
+Quote Post
LurkerOutThere
post Aug 1 2011, 08:06 PM
Post #17


Runner
******

Group: Dumpshocked
Posts: 2,946
Joined: 1-June 09
From: Omaha
Member No.: 17,234



Sounds like your rigger needs to imrprove his system security but no, ther'es nothing by the book that makes him automagicly aware of a new presence on the node.

The downside to slaving is of course if the enemy can get the master node they've got everybody.
Go to the top of the page
 
+Quote Post
sgtbarnesKY
post Aug 1 2011, 08:19 PM
Post #18


Target
*

Group: Members
Posts: 27
Joined: 17-June 10
Member No.: 18,719



Yeah, that's what I was thinking and what I did, I had the team role initiative once the drones targeted them, that seemed like the logical place to do it, once their Tacnet feeds showed that they where the ones being targeted. My hacker was just upset that someone could hack it his drones without him being alerted or not seeing the extra subscription on the drones. Nothing I've ever read says that he would be alerted until the drones paint a bullseye on the back of his head. Of course the drones were only armes with light pistols so I only ended up hurting my cat shaman who's got low body/armor but end the end they stopped the drones rampage of doom and nearly killed the techno with butt strokes and power bolts. Plus I'm a nice GM and let them my mage spend his last 2 points of edge to save her life with a heal spell, working in conjunction with their medic. Of course I had the techno end up being in a coma
Go to the top of the page
 
+Quote Post
Aerospider
post Aug 1 2011, 09:23 PM
Post #19


Running Target
***

Group: Members
Posts: 1,150
Joined: 15-December 09
Member No.: 17,968



QUOTE (sgtbarnesKY @ Aug 1 2011, 09:19 PM) *
Yeah, that's what I was thinking and what I did, I had the team role initiative once the drones targeted them, that seemed like the logical place to do it, once their Tacnet feeds showed that they where the ones being targeted. My hacker was just upset that someone could hack it his drones without him being alerted or not seeing the extra subscription on the drones. Nothing I've ever read says that he would be alerted until the drones paint a bullseye on the back of his head. Of course the drones were only armes with light pistols so I only ended up hurting my cat shaman who's got low body/armor but end the end they stopped the drones rampage of doom and nearly killed the techno with butt strokes and power bolts. Plus I'm a nice GM and let them my mage spend his last 2 points of edge to save her life with a heal spell, working in conjunction with their medic. Of course I had the techno end up being in a coma

Hmm, you know I think it might be possible. It's not spelled out in RAW, but couldn't one configure a node to report on all subscriptions as and when they are established? Whilst Stealth will make an icon appear legitimate (particularly in a node without Analyse) surely the node must be constantly aware of how many devices it's communicating with and even be able to distinguish them? If the owner has it IM his link every time someone/something logs on he'll know about the intrusion before any mischief can occur. He might have to burn a simple action to ascertain that the newcomer is an unknown though.

Does that work?

Could one even set a maximum number of subscriptions and fill them with friendly connections?
Go to the top of the page
 
+Quote Post
HunterHerne
post Aug 1 2011, 09:37 PM
Post #20


Running Target
***

Group: Members
Posts: 1,019
Joined: 10-November 10
From: Annapolis Valley, Nova Scotia
Member No.: 19,166



QUOTE (Aerospider @ Aug 1 2011, 05:23 PM) *
Hmm, you know I think it might be possible. It's not spelled out in RAW, but couldn't one configure a node to report on all subscriptions as and when they are established? Whilst Stealth will make an icon appear legitimate (particularly in a node without Analyse) surely the node must be constantly aware of how many devices it's communicating with and even be able to distinguish them? If the owner has it IM his link every time someone/something logs on he'll know about the intrusion before any mischief can occur. He might have to burn a simple action to ascertain that the newcomer is an unknown though.

Does that work?

Could one even set a maximum number of subscriptions and fill them with friendly connections?


The maximum number of subscriptions is System x2 for normal nodes. But I don't see anything about limiting it further, except through slaving. I would assume you can set up an alert if someone sets up a subscription, and I would allow it. It does give a little bit of extra security to the team hacker/rigger, even if they now need to find the invasive party (I would say Analyze +Computer (Stealth x2, one pass), maybe.)
Go to the top of the page
 
+Quote Post
UmaroVI
post Aug 1 2011, 09:47 PM
Post #21


Shooting Target
****

Group: Members
Posts: 1,700
Joined: 1-July 10
Member No.: 18,778



I would definitely not allow that. I assume that programming your nodes with variants of "Tell me if someone logs on" and "don't get hacked" are a standard part of Firewall. If you allow Simon Says type arbitrary rules, you quickly wind up with "set Hacking to 'No.'" And then why don't NPCs do it?

The way to stop yourself from getting hacked is run in hidden, high Firewall, high Analyze, agent running Analyze checks.

One thing you can legitimately do is to set all permissions as "Off" except in Admin. You can ban people with insufficient access from taking certain actions (this is explicitly states in Unwired), so you bar anyone without Admin access from doing anything at all. This does, at least, force people to get Admin accounts to do anything meaningful to you.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Aug 1 2011, 09:57 PM
Post #22


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (HunterHerne @ Aug 1 2011, 02:37 PM) *
The maximum number of subscriptions is System x2 for normal nodes. But I don't see anything about limiting it further, except through slaving. I would assume you can set up an alert if someone sets up a subscription, and I would allow it. It does give a little bit of extra security to the team hacker/rigger, even if they now need to find the invasive party (I would say Analyze +Computer (Stealth x2, one pass), maybe.)


More Correctly. The Maximum amount of Subscriptions BEFORE RESPONSE IS AFFECTED, is 2x System. (IMG:style_emoticons/default/wobble.gif)
Additional Subscriptions after that point are treated as Additional Programs, and affect Response accordingly.
Go to the top of the page
 
+Quote Post
HunterHerne
post Aug 1 2011, 10:07 PM
Post #23


Running Target
***

Group: Members
Posts: 1,019
Joined: 10-November 10
From: Annapolis Valley, Nova Scotia
Member No.: 19,166



QUOTE (Tymeaus Jalynsfein @ Aug 1 2011, 05:57 PM) *
More Correctly. The Maximum amount of Subscriptions BEFORE RESPONSE IS AFFECTED, is 2x System. (IMG:style_emoticons/default/wobble.gif)
Additional Subscriptions after that point are treated as Additional Programs, and affect Response accordingly.


Fair enough.
Go to the top of the page
 
+Quote Post
Warlordtheft
post Aug 2 2011, 12:25 AM
Post #24


Neophyte Runner
*****

Group: Members
Posts: 2,328
Joined: 2-April 07
From: The Center of the Universe
Member No.: 11,360



QUOTE (LurkerOutThere @ Aug 1 2011, 04:06 PM) *
The downside to slaving is of course if the enemy can get the master node they've got everybody.


However, If your hacker has lost control of his system, you are probably screwed matrix wise anyway. Bubba the love troll probably doesn't have much in the way of matrix protection. He spent all his money on Dwarf Troll porn and lube.

(IMG:style_emoticons/default/biggrin.gif)
Go to the top of the page
 
+Quote Post
Yerameyahu
post Aug 2 2011, 12:33 AM
Post #25


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



AFAIK, you can impose arbitrary controls on your node: a hard list of whitelisted subscriptions, for example, or a max total. I'm not sure it's useful (or, more accurately, worth the effort), but you *can* do many things not specifically in the book.
Go to the top of the page
 
+Quote Post

2 Pages V   1 2 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 16th April 2024 - 02:35 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.