IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Hacking privileges, Can't find the rule - did I dream it?
Aerospider
post Aug 28 2011, 03:53 PM
Post #1


Running Target
***

Group: Members
Posts: 1,150
Joined: 15-December 09
Member No.: 17,968



Hey guys, I need a page reference (SR4a or Unwired) or to be told it does not exist.

Say you have a security account (legit or otherwise) but you want to do something that needs admin privileges. Is it impossible, or can it be done with a roll where a legitimate user would not have to roll?
Go to the top of the page
 
+Quote Post
Xenefungus
post Aug 28 2011, 04:15 PM
Post #2


Moving Target
**

Group: Members
Posts: 315
Joined: 6-August 06
Member No.: 9,032



It's true, but I don't have a page for you, too.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Aug 28 2011, 04:37 PM
Post #3


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Aerospider @ Aug 28 2011, 08:53 AM) *
Hey guys, I need a page reference (SR4a or Unwired) or to be told it does not exist.

Say you have a security account (legit or otherwise) but you want to do something that needs admin privileges. Is it impossible, or can it be done with a roll where a legitimate user would not have to roll?


You would have to spoof the command at that point, using the -6 Dice for lack of Appropriate Admin Access (IIRC). I have seen it. Will have to actually look for the rule though.
Go to the top of the page
 
+Quote Post
Seerow
post Aug 28 2011, 04:42 PM
Post #4


Moving Target
**

Group: Members
Posts: 705
Joined: 3-April 11
Member No.: 26,658



QUOTE (Tymeaus Jalynsfein @ Aug 28 2011, 05:37 PM) *
You would have to spoof the command at that point, using the -6 Dice for lack of Appropriate Admin Access (IIRC). I have seen it. Will have to actually look for the rule though.


Isn't there a rule that if you try to spoof a different access ID while you're already in a node, you get automatically disconnected because your access ID changed tipping the node off that you're lying? I'm pretty sure I saw something along those lines.
Go to the top of the page
 
+Quote Post
Aerospider
post Aug 28 2011, 04:45 PM
Post #5


Running Target
***

Group: Members
Posts: 1,150
Joined: 15-December 09
Member No.: 17,968



QUOTE (Tymeaus Jalynsfein @ Aug 28 2011, 05:37 PM) *
You would have to spoof the command at that point, using the -6 Dice for lack of Appropriate Admin Access (IIRC). I have seen it. Will have to actually look for the rule though.

But only peripheral devices and things with pilot programs can be spoofed, so on other nodes one can only log off and hack a better account?
Go to the top of the page
 
+Quote Post
Aerospider
post Aug 28 2011, 04:48 PM
Post #6


Running Target
***

Group: Members
Posts: 1,150
Joined: 15-December 09
Member No.: 17,968



QUOTE (Seerow @ Aug 28 2011, 05:42 PM) *
Isn't there a rule that if you try to spoof a different access ID while you're already in a node, you get automatically disconnected because your access ID changed tipping the node off that you're lying? I'm pretty sure I saw something along those lines.

I believe there's a difference between using Spoof to change your access ID and using it to change the access ID on the individual command you're sending. The first would cause an account issue, but with the latter the device thinks the command came from someone else. I think.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Aug 28 2011, 04:51 PM
Post #7


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Aerospider @ Aug 28 2011, 09:48 AM) *
I believe there's a difference between using Spoof to change your access ID and using it to change the access ID on the individual command you're sending. The first would cause an account issue, but with the latter the device thinks the command came from someone else. I think.


Something like that. When you set off an alarm on a system, all of your Account Priveleges are nullified, and you MUST spoof everything you do until you log off. You CAN spoof commands that you do not have access to use per your own Access Rights. Again, no pages, as I am AFB, but I know that I saw that as well. 2 Different usages for a single word causes a few problems from time to time.
Go to the top of the page
 
+Quote Post
hobgoblin
post Aug 28 2011, 05:15 PM
Post #8


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



When doing something test worthy with a legitimate account one use computer, when it it outside the privileges of said account, one use hacking. Spoof only enter into it when one do not have the option or inclination to log in in some way.

If one have a low level of account and want to get higher, one basically hack ones way up in the same way as the initial hack. Perhaps the GM can give a slight dice bonus for being inside (more effort may have been focused on hardening the system from outside intrusion rather then inside escalation).
Go to the top of the page
 
+Quote Post
Aerospider
post Aug 28 2011, 05:21 PM
Post #9


Running Target
***

Group: Members
Posts: 1,150
Joined: 15-December 09
Member No.: 17,968



QUOTE (Tymeaus Jalynsfein @ Aug 28 2011, 05:51 PM) *
Something like that. When you set off an alarm on a system, all of your Account Priveleges are nullified, and you MUST spoof everything you do until you log off. You CAN spoof commands that you do not have access to use per your own Access Rights. Again, no pages, as I am AFB, but I know that I saw that as well. 2 Different usages for a single word causes a few problems from time to time.

Ah, of course! Alerts, Unwired p. 67.

'Additionally, all privileges involving the node itself (such as deactivating programs or agents, rebooting, editing files, etc.) are no longer automatically allowed to the trespasser, who must either use the Hacking skill to perform such actions or Spoof a command from a legitimate user that still has her permissions intact.'

But then, that doesn't quite satisfy my query in itself. I would assume that this passage implies one can use the Hacking skill this way for permissions not afforded to the account being used even without an alert, but it would be nice to find some corroborating text.

Also, what about commanding a linked drone? Doesn't really make sense to replace Pilot Aircraft with Hacking, but then maybe that doesn't count because it concerns a different node?
Go to the top of the page
 
+Quote Post
Sengir
post Aug 28 2011, 05:42 PM
Post #10


Great Dragon
*********

Group: Dumpshocked
Posts: 5,091
Joined: 3-October 09
From: Kohle, Stahl und Bier
Member No.: 17,709



QUOTE (Aerospider @ Aug 28 2011, 03:53 PM) *
Hey guys, I need a page reference (SR4a or Unwired) or to be told it does not exist.

I'm quite sure it doesn't exist -- in general, the combination of user accounts and hacking seemingly did not get much attention from the devs (IMG:style_emoticons/default/wink.gif)
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Aug 28 2011, 05:54 PM
Post #11


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Aerospider @ Aug 28 2011, 10:21 AM) *
Ah, of course! Alerts, Unwired p. 67.

'Additionally, all privileges involving the node itself (such as deactivating programs or agents, rebooting, editing files, etc.) are no longer automatically allowed to the trespasser, who must either use the Hacking skill to perform such actions or Spoof a command from a legitimate user that still has her permissions intact.'

But then, that doesn't quite satisfy my query in itself. I would assume that this passage implies one can use the Hacking skill this way for permissions not afforded to the account being used even without an alert, but it would be nice to find some corroborating text.



That's the one...
Go to the top of the page
 
+Quote Post
Udoshi
post Aug 28 2011, 11:17 PM
Post #12


Runner
******

Group: Members
Posts: 2,782
Joined: 28-August 09
Member No.: 17,566



QUOTE (Tymeaus Jalynsfein @ Aug 28 2011, 10:37 AM) *
You would have to spoof the command at that point, using the -6 Dice for lack of Appropriate Admin Access (IIRC). I have seen it. Will have to actually look for the rule though.


Part of the problem for Account Priviledges is that its split between the core book and unwired.

Security/Admin difficulty threshold adjustments are in the core book, but spoofing penalties are detailed in Unwired. Specifically in the Advanced Spoofing section in, i think, the hacker handbook.

Unwired also changes the Account Types around a bit, by introducing a new account type with priviledges even worse than the standard user: Public accounts/access, which is something to be aware of.


The question I have is.....
Okay, so I'm fairly sure that when you don't have permissions for an action you want to take on the node, you must roll Hacking+Exploit(lets go with exploit), penalized by the priviledge adjustment while the system opposes the change with System+Firewall. If you fail, it stops you.
But for the life of me, i can't find that in text. Anyone know where its at? That specific bit of rules text that deals with 'what happens when you don't have priviledges and need to roll to hack'.

Go to the top of the page
 
+Quote Post
Merlin
post Aug 29 2011, 06:54 AM
Post #13


Target
*

Group: Members
Posts: 10
Joined: 29-June 11
Member No.: 32,397



Somewhere in the text of the matrixchapter or Unwird there is something like a hacking edit. You roll Hacking + Edit to edit something you have no priviledges to edit. I will try to look it up.

Edit: On page 67 Unwird there is a exemple for using hacking to edit somthing you have no priviledges for.

Hm, not much information.
Go to the top of the page
 
+Quote Post
Aerospider
post Aug 29 2011, 08:02 AM
Post #14


Running Target
***

Group: Members
Posts: 1,150
Joined: 15-December 09
Member No.: 17,968



QUOTE (Udoshi @ Aug 29 2011, 12:17 AM) *
Part of the problem for Account Priviledges is that its split between the core book and unwired.

Security/Admin difficulty threshold adjustments are in the core book, but spoofing penalties are detailed in Unwired. Specifically in the Advanced Spoofing section in, i think, the hacker handbook.

Unwired also changes the Account Types around a bit, by introducing a new account type with priviledges even worse than the standard user: Public accounts/access, which is something to be aware of.


The question I have is.....
Okay, so I'm fairly sure that when you don't have permissions for an action you want to take on the node, you must roll Hacking+Exploit(lets go with exploit), penalized by the priviledge adjustment while the system opposes the change with System+Firewall. If you fail, it stops you.
But for the life of me, i can't find that in text. Anyone know where its at? That specific bit of rules text that deals with 'what happens when you don't have priviledges and need to roll to hack'.

That's pretty much the question that started this thread.
I'm getting to the point where I'm just going to house rule it this way.

But there are sub-questions on my mind:
What about actions that require a roll from legitimate users? Such as controlling a device? Should the hacker roll twice, once for permission and once for effect?
Also, should a failure instigate an alert, or should that only come from a glitch?

I don't think the -3/-6 penalty does apply to this hacking roll. It doesn't in the case of a restricted alert.
Go to the top of the page
 
+Quote Post
hobgoblin
post Aug 29 2011, 02:48 PM
Post #15


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



Nah, it is just a change of skill. As long as one can use computer, one is doing everything on the up and up and should never trigger an alarm. But one will be basically locked out of doing anything outside the privileges of the user account one is currently logged in as.

Think of computer as driving using the key, and hacking as driving by hotwiring the ignition. Both get things going, but the latter is likely to raise some questions by observers.
Go to the top of the page
 
+Quote Post
Udoshi
post Aug 29 2011, 11:10 PM
Post #16


Runner
******

Group: Members
Posts: 2,782
Joined: 28-August 09
Member No.: 17,566



In the end, i went looking for answers in the book on my own - its worth noting that the 4th edition book tends to be a bit clearer on how the matrix works, providing examples, and stuff like that. It was one of the sections that i feel got cut down a bit for anniversary. Its missing some things, like the rigger actions table. Oddly, decrypt used to be Decrypt+Response. Huh. The more you know.

Anyway. Found the answer. Its in an example in unwired(67)

The young hacker, /dev/grrl, has hacked herself an
admin account, but she glitches on a roll and an active
alert ensues. While she normally would have been able
to Edit the node’s access log without rolling, she now must
make an Opposed Hacking + Edit Test against the node’s
Firewall + System to do so.

Thanks devgrll.

Will look more into it, see if that's backed up anywhere.
Go to the top of the page
 
+Quote Post
Aerospider
post Aug 30 2011, 06:04 AM
Post #17


Running Target
***

Group: Members
Posts: 1,150
Joined: 15-December 09
Member No.: 17,968



Thanks for the help guys, but no need to keep quoting/citing Unwired p.67. That's the third time now.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 13th July 2025 - 06:03 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.