![]() ![]() |
Jun 24 2025, 09:32 AM
Post
#26
|
|
|
jacked in ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 9,682 Joined: 26-February 02 Member No.: 463 |
Summoning a Guidance Spirit F9+1 (Enhanced Senses (Low-Light Vision, Thermographic Vision, Smell)) with Channeling
Summoning 4 hits Resistance 2 hits Drain 4S No Drain Replacing the Increase Charisma spell with Increase Intuition F6 Spellcasting 7(6) hits Drain 3S No Drain Astral Perception / Assensing 5 hits Bye Thanee |
|
|
|
Jun 24 2025, 03:26 PM
Post
#27
|
|
|
Neophyte Runner ![]() ![]() ![]() ![]() ![]() Group: Dumpshocked Posts: 2,155 Joined: 21-July 14 From: Northern UCAS (with regular trips to Quebec) Member No.: 190,206 |
Now with rolls!
1) Drone swarm search, looking for little things not easily seen by people (tucked into a light fixture, behind furniture, a loose baseboard, or whatever) Led by Kaa (sewer snake, can climb walls), supported by 4 kanmushi and 4 flying eyes for +9. Clearsight running on RCC R6/data processing 5 Intuition* 5+Clearsight 6+8 supporting drones=19 dice * I haven't found where I stashed Rigger 5, but I think it is the RCC's data processing that is used in place of Pilot to establish attributes when the RCC is coordinating a swarm Drone searching: 19d6t5 8 8 successes 2) Matrix Perception, looking for things running silent Intuition 6 + computers (matrix perception) 7 + perceptive 1 = 14 dice Matrix Perception: 14d6t5 8 hot dice -- 8 successes to spot hidden devices 3) Trying to hack the outdoors camera, just for kicks. Sleazing it: -Sleaze dongle 3, overclocker set to Sleaze, and in Datajack+ run the program for +1 sleaze giving sleaze 5. - Logic 5 + hacking (devices) 7 = 12, vs rating 2x2=4 hacking outside camera: 12d6t5 5 outdoor camera resist: 4d6t5 1 (could just buy successes on this I guess -- from there copy it to go over in more detail later, and do a fast skim to look for anyone entering or leaving) |
|
|
|
Jun 25 2025, 05:11 AM
Post
#28
|
|
|
jacked in ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 9,682 Joined: 26-February 02 Member No.: 463 |
|
|
|
|
Jun 25 2025, 10:26 AM
Post
#29
|
|
|
jacked in ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 9,682 Joined: 26-February 02 Member No.: 463 |
"Glowing brilliantly to the astral senses" ... this means they are magical in nature? Or just that there is a strong astral imprint on them?
Either way, seems like we should definitely take a closer look into that room... Bye Thanee |
|
|
|
Jun 25 2025, 11:27 AM
Post
#30
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,251 Joined: 12-June 16 From: Israel Member No.: 200,423 |
Oh there is a ward I missed?
Trouble vs Ward first is trouble.: 2#10d6t5 1 3 Trouble vs Ward first is trouble.: 2#10d6t5 6 3 |
|
|
|
Jun 25 2025, 11:28 AM
Post
#31
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,123 Joined: 18-September 13 From: Germany Member No.: 154,444 |
Strong astral aura - it's not exactly magical, but incredible strong imprints
@gilga the cellar room has a ward - but it's a zapper ward, so maybe Trouble should avoid diving in head first Also ward rolls Force x2 dice... |
|
|
|
Jun 25 2025, 12:25 PM
Post
#32
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,251 Joined: 12-June 16 From: Israel Member No.: 200,423 |
it is F10? he can't enter that. I'll edit.
|
|
|
|
Jun 25 2025, 04:13 PM
Post
#33
|
|
|
jacked in ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 9,682 Joined: 26-February 02 Member No.: 463 |
|
|
|
|
Jun 25 2025, 06:58 PM
Post
#34
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,251 Joined: 12-June 16 From: Israel Member No.: 200,423 |
I guess I skimmed over it, I was a bit behind.
|
|
|
|
Jun 25 2025, 08:38 PM
Post
#35
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,251 Joined: 12-June 16 From: Israel Member No.: 200,423 |
Hi Jack I assume tagging the sensors would mark the physical location? or do we play hide and seek to find them?
|
|
|
|
Jun 26 2025, 05:07 AM
Post
#36
|
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,501 Joined: 1-September 11 From: Seattle Member No.: 37,075 |
What kind of lock is on the safe? Here are the options and, for my future reference, the test to defeat them:
Key locks: Locksmith + Agility [Physical] (Lock Rating, 1 Combat Turn) Extended Test. Autopickers (p.447) add their Rating in dice to this test Transponder-embedded keys: Hardware + Logic [Mental] (Lock Rating, 1 minute) Extended Test Maglocks: (Step 1 open it up) Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test, (Step 2 bypass anti-tamper circuits) Locksmith + Agility [Physical] (anti-tamper system rating) Test There are other locks, like facial recognition or DNA scanners, but I doubt we're going down that route. Mato should be able to handle both locks, but AM might have the better dice pool for the maglock(s). |
|
|
|
Jun 26 2025, 06:30 AM
Post
#37
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,251 Joined: 12-June 16 From: Israel Member No.: 200,423 |
she can also give a few more dice with improve logic, and or leadership.
So the next step is to crack the lock and unleash whatever is locked in that basement? |
|
|
|
Jun 26 2025, 08:13 AM
Post
#38
|
|
|
jacked in ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 9,682 Joined: 26-February 02 Member No.: 463 |
We might want to deal with the surveillance first...
Bye Thanee |
|
|
|
Jun 26 2025, 11:48 AM
Post
#39
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,123 Joined: 18-September 13 From: Germany Member No.: 154,444 |
Finding the bugs is trivial once you detected their existence (cyberware scanner and/or matrix based tagging)
@safe lock: It's an R4 biometric lock, wifi connected to the security host. @bugs: hacking them to trace where their collected data is sent too, is easy as well, but leads to somewhat of a dead end: the data is sent to a random advertising display in Downtown Seattle where anyone could retrieve the data if they knew where to look. Unless you are monitoring the device to catch the perpetrator during pickup, you won't find out who is behind this. |
|
|
|
Jun 26 2025, 01:45 PM
Post
#40
|
|
|
jacked in ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 9,682 Joined: 26-February 02 Member No.: 463 |
@bugs: hacking them to trace where their collected data is sent too, is easy as well, but leads to somewhat of a dead end: the data is sent to a random advertising display in Downtown Seattle where anyone could retrieve the data if they knew where to look. Unless you are monitoring the device to catch the perpetrator during pickup, you won't find out who is behind this. Main question here would be... Is it possible to figure out, whether the data of the last few minutes (i.e. since our arrival) has been accessed / picked up, yet? If not, it might be a good idea to remove it. Bye Thanee |
|
|
|
Jun 26 2025, 03:08 PM
Post
#41
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,123 Joined: 18-September 13 From: Germany Member No.: 154,444 |
That is possible - hack the R2 display directly or the R6 host protecting it and access the log file.
|
|
|
|
Jun 27 2025, 08:44 AM
Post
#42
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,123 Joined: 18-September 13 From: Germany Member No.: 154,444 |
Opening a mag lock is a control device action - though with that amount of successes, even a reduction of dice doesn't change the success (IMG:style_emoticons/default/wink.gif)
|
|
|
|
Jun 27 2025, 11:46 AM
Post
#43
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,251 Joined: 12-June 16 From: Israel Member No.: 200,423 |
For the record, What do I roll for control device? My cheatsheet was vouge about it.
|
|
|
|
Jun 27 2025, 01:37 PM
Post
#44
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,123 Joined: 18-September 13 From: Germany Member No.: 154,444 |
Electronic Warfare + Intuition [Sleaze] v. Intuition + Firewall
Alternatively you could have used Spoof Command, Hacking + Intuition [Sleaze] v. Logic + Firewall, but for that you would need a MARK on Diego's commlink (which is offline, though you haven't checked that yet) |
|
|
|
Jun 27 2025, 09:20 PM
Post
#45
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,251 Joined: 12-June 16 From: Israel Member No.: 200,423 |
Thanks Jack.
|
|
|
|
Jun 30 2025, 09:11 AM
Post
#46
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,123 Joined: 18-September 13 From: Germany Member No.: 154,444 |
So, any other actions you want to take?
|
|
|
|
Jun 30 2025, 09:52 PM
Post
#47
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,251 Joined: 12-June 16 From: Israel Member No.: 200,423 |
Mato wants to hack the deadrop but given the host level I think we should go there and try to get a direct access.
|
|
|
|
Jul 1 2025, 03:07 AM
Post
#48
|
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,501 Joined: 1-September 11 From: Seattle Member No.: 37,075 |
Oh, I thought AM wanted to do it remotely.
I was thinking Edge could do the trick. Beta, what was that drive you were referring to? Did we have one that could plug and provide a direct connection remotely? |
|
|
|
Jul 1 2025, 04:42 AM
Post
#49
|
|
|
jacked in ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Admin Posts: 9,682 Joined: 26-February 02 Member No.: 463 |
How far away is that, if we were to go there?
Bye Thanee |
|
|
|
Jul 1 2025, 06:51 AM
Post
#50
|
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,501 Joined: 1-September 11 From: Seattle Member No.: 37,075 |
@bugs: hacking them to trace where their collected data is sent too, is easy as well, but leads to somewhat of a dead end: the data is sent to a random advertising display in Downtown Seattle where anyone could retrieve the data if they knew where to look. Unless you are monitoring the device to catch the perpetrator during pickup, you won't find out who is behind this. We're somewhere in Bellevue. If the the display is in Downtown then we're probably 20-30 minutes away, depending on distance and traffic. I'm blanking on which drone Tamarind was referring to. Is there a way we could passively monitor the device for when the data is retrieved? Do we have an agent who is up to the task? |
|
|
|
![]() ![]() |
|
Lo-Fi Version | Time is now: 6th November 2025 - 05:28 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.