IPB

Welcome Guest ( Log In | Register )

2 Pages V   1 2 >  
Reply to this topicStart new topic
> The Commlink used as a Repeater, Just what it says
Wasabi
post Sep 12 2005, 04:49 PM
Post #1


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



He-Man can hack a commlink and then unsubscribe the poor sap carrying it and then subscribe himself. His own commlink and the target commlink must both be within each other's signal range.

Once the target commlink is hacked He-Man uploads his hacking programs and uses the target commlink to hack into building security which is within the target commlink's range but not his own personal commlink's signal range.

He-Man now has 1 global PAN (so he can be hacked and traced normally) but his range is now based on the signal rating of *either* commlink.

This seems valid to me, am I missing anything? The only thing I can think of is that a commlink subscribing a second commlink would violate the only-one-firewall rule, which possibly would require unloading the firewall on the target commlink (its a program, after all) and then hacking in using his personal commlink's firewall as the PAN firewall.

Legit or not?
Go to the top of the page
 
+Quote Post
apple
post Sep 12 2005, 04:53 PM
Post #2


Moving Target
**

Group: Members
Posts: 875
Joined: 16-November 03
Member No.: 5,827



It seems legit.

SYL
Go to the top of the page
 
+Quote Post
Dashifen
post Sep 12 2005, 04:58 PM
Post #3


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



Has a good beat, I can dance to it. Applications of the technique may need to be carefully prepared in advance, and the wallpaper or paint or whatever it was that reduced wireless signals within a building could put a big crutch in pulling this one off. Plus, if you dump the original person from their commlink, wouldn't they notice? And, I'd definately apply the +6 for admin access to the commlink (as it's an everday device and thus only has amin access).
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Sep 12 2005, 05:05 PM
Post #4


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



Keep in mind that the hacked commlink will usually have a smaller Response rating, though - so limiting the usage of all Programs.
Go to the top of the page
 
+Quote Post
RunnerPaul
post Sep 12 2005, 05:33 PM
Post #5


Neophyte Runner
*****

Group: Members
Posts: 2,086
Joined: 26-February 02
Member No.: 364



Conceptually, I like the feel of this. Very much reminds me of the present day technique of pwning some poor n00b's computer and turning it into a zombie box to launch your nefarious schemes from.

Though these days, it's usually hundreds of poorly secured boxes getting co-opted all at once by a virus or other malware, and then the whole colection of pwned machines being used for a distributed attack.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Sep 12 2005, 05:38 PM
Post #6


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



..that would be inserting Agents into named systems, and subscribing them as one... sweet.

Talking about repeaters... yet I missed a single device just boosting signal strenght.
Shouldn't it be possible though, to just use a comlink a booster station?
(This becoms relevant to users of implanted commlinks, as their signal rating should be limited to 2)
Go to the top of the page
 
+Quote Post
Lindt
post Sep 12 2005, 05:54 PM
Post #7


Man In The Machine
*****

Group: Dumpshocked
Posts: 2,264
Joined: 26-February 02
From: I-495 S
Member No.: 1,105



But suddenly the idea of hacking 200 people acros the city and creating your own WAN seems wicked entertaining.
Go to the top of the page
 
+Quote Post
kigmatzomat
post Sep 12 2005, 07:33 PM
Post #8


Moving Target
**

Group: Members
Posts: 909
Joined: 26-August 05
From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.)
Member No.: 7,626



Could also work as a decoy; give the troll a spare comm to carry around just for use as a relay. You can stash an Agent program on the spare instructed to crash the system or shut down all communication in the case of a breach. Maybe add a biomonitor to the link so if you passout it'll be able to shut things down. Should you get dropped by BlackOut/Hammer, any security that tries to access your Comm will have a nasty surprise.

And the reason I give it to the troll is in case they get a GPS fix on it via triangulation or breaking into it.
Go to the top of the page
 
+Quote Post
mfb
post Sep 12 2005, 07:51 PM
Post #9


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



99% of the time, the signal rating of your commlink isn't going to matter. that's the whole point of mesh networking; everybody in the mesh acts as a mini-repeater as your packets get routed to where you want them to go. there's no real need to even unsubscribe the main user (and if you do, he'll just reset his commlink and boot you anyway), you can already accomplish the same level of anonymity just by spoofing your datatrail. it's a neat, clever way to do something that's already possible through much simpler means.
Go to the top of the page
 
+Quote Post
Slacker
post Sep 12 2005, 07:55 PM
Post #10


Runner
******

Group: Members
Posts: 3,420
Joined: 30-October 03
Member No.: 5,776



QUOTE (Lindt)
But suddenly the idea of hacking 200 people acros the city and creating your own WAN seems wicked entertaining.

QUOTE (*SR4 p. 212 last paragraph of Linking and Subscribing)
In game terms, your persona maintains a subscription list of nodes that you are accessing and that are allowed to establish communication with you. The subscription list may be unlimited in size, but the number of nodes, agents or drones that a persona may actively subscribe to (access) at any one time is limited to the persona's System x 2

That means you won't be accessing anywhere close to 200 people.
Go to the top of the page
 
+Quote Post
Dashifen
post Sep 12 2005, 08:01 PM
Post #11


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



Not without 20 of your closest friends :D
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Sep 12 2005, 08:02 PM
Post #12


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



Yes, you can - you can subscribe multiple Agents or Drones as one Subsription...
Go to the top of the page
 
+Quote Post
mfb
post Sep 12 2005, 08:02 PM
Post #13


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



actually, you could create a seperate-from-the-Matrix mesh network comprised solely of the commlinks you've hacked. just subscribe them to other commlinks you've hacked, which subscribe to yet others, which eventually you have subscribed.

granted, though, this network will take about six seconds to fall apart. that's about how long it takes to do a perception check to notice your commlink's on the fritz, and then reset it.
Go to the top of the page
 
+Quote Post
RunnerPaul
post Sep 12 2005, 08:04 PM
Post #14


Neophyte Runner
*****

Group: Members
Posts: 2,086
Joined: 26-February 02
Member No.: 364



QUOTE (Slacker @ Sep 12 2005, 02:55 PM)
QUOTE (*SR4 p. 212 last paragraph of Linking and Subscribing)
In game terms, your persona maintains a subscription list of nodes that you are accessing and that are allowed to establish communication with you. The subscription list may be unlimited in size, but the number of nodes, agents or drones that a persona may actively subscribe to (access) at any one time is limited to the persona's System x 2

That means you won't be accessing anywhere close to 200 people.

Ah, but if you can only access System x 2 other comlinks, couldn't those comlinks also access that comlink's System x 2? Besides, we've seen examples in the past where limitations on how many things you can have on your subscriber network were bypassed; Deus had many more remote drones than would normally be allowed, springs to mind.

As for the comlink's owner noticing that something's wrong with their comlink, couldn't you set up some sort of Virtual Machine that made it look like everything was ok, just running slower?
Go to the top of the page
 
+Quote Post
Dashifen
post Sep 12 2005, 08:09 PM
Post #15


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



QUOTE (Rotbart van Dainig)
Yes, you can - you can subscribe multiple Agents or Drones as one Subsription...

But you have to command them all to do the same thing. If you wanted those agents or drones to be doing different tasks, then it's 1 to 1 for subscriptions to drone/agent.
Go to the top of the page
 
+Quote Post
RunnerPaul
post Sep 12 2005, 08:27 PM
Post #16


Neophyte Runner
*****

Group: Members
Posts: 2,086
Joined: 26-February 02
Member No.: 364



QUOTE (Dashifen)
But you have to command them all to do the same thing. If you wanted those agents or drones to be doing different tasks, then it's 1 to 1 for subscriptions to drone/agent.

Depending on what you wanted to use a large network of hijacked comlinks for, this might not be a problem.
Go to the top of the page
 
+Quote Post
Dashifen
post Sep 12 2005, 08:27 PM
Post #17


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



Good point :D
Go to the top of the page
 
+Quote Post
Kesh
post Sep 12 2005, 09:16 PM
Post #18


Moving Target
**

Group: Members
Posts: 293
Joined: 27-January 03
From: Kentucky, USA
Member No.: 3,958



My big problem is that, once you unsubscribe the poor sap, he's going to be wondering why his AR glasses just went dead, he's not recieving messages, etc. and reboot the system. Meaning you'd have a minute or two to use the hacked unit before you're booted off again.
Go to the top of the page
 
+Quote Post
Wasabi
post Sep 12 2005, 10:21 PM
Post #19


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



So it most valid for a team of shadowrunners who are geographically seperated. Sort of a leap-frog thing.
Go to the top of the page
 
+Quote Post
Elldren
post Sep 12 2005, 11:23 PM
Post #20


Target
*

Group: Members
Posts: 34
Joined: 10-September 05
Member No.: 7,725



Hooray! Zombie-bot DDOS attack networks of the future!
Go to the top of the page
 
+Quote Post
RunnerPaul
post Sep 13 2005, 12:23 AM
Post #21


Neophyte Runner
*****

Group: Members
Posts: 2,086
Joined: 26-February 02
Member No.: 364



QUOTE (Kesh)
My big problem is that, once you unsubscribe the poor sap, he's going to be wondering why his AR glasses just went dead, he's not recieving messages, etc. and reboot the system. Meaning you'd have a minute or two to use the hacked unit before you're booted off again.

Again, I ask, wouldn't it be possible to set up a Virtual Machine that duplicates the functions that the comlink was providing for its legitimate user, but with a diminished processing capcity? Sure the guy might notice that his response has gone sluggish, but it'd be less obvious than a total loss of functionality.
Go to the top of the page
 
+Quote Post
kigmatzomat
post Sep 13 2005, 02:11 AM
Post #22


Moving Target
**

Group: Members
Posts: 909
Joined: 26-August 05
From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.)
Member No.: 7,626



I think the easier thing to do is not do anything to alert the user. The zombie-spam bots work just fine for the idiot Comcast user who wants to get email and surf the web for porn. It may be a tad bit slower at times but he won't really be able to tell that it's not the sites he's visiting.

From my read of the rules, the use of a Comm's standard functions cause no load. Meaning you can have your AR glasses, headphones, gloves, and walk around IM-ing, listening to "the radio", etc without running a single System-draining application. Hackers will have full use of the CPU for their own nefarious needs. At the very worst, they'll be at Response-1.
Go to the top of the page
 
+Quote Post
hahnsoo
post Sep 13 2005, 02:14 AM
Post #23


Mr. Johnson
******

Group: Dumpshocked
Posts: 2,587
Joined: 25-January 05
From: Berkeley, CA
Member No.: 7,014



QUOTE (Kesh)
My big problem is that, once you unsubscribe the poor sap, he's going to be wondering why his AR glasses just went dead, he's not recieving messages, etc. and reboot the system. Meaning you'd have a minute or two to use the hacked unit before you're booted off again.

I can imagine a scenario where the runners knock out a scientist/guard/lackey and then the hacker does exactly what is stated above. The commlink would still be on (perhaps not if it was a cyber-commlink, but you'd select a target with a non-cyber one anyway), and the hacker can masquerade as the lackey's commlink that way in secured internal systems. If it gets traced, it goes back to the lackey (dumped into a convenient closet somewhere).
Go to the top of the page
 
+Quote Post
mfb
post Sep 13 2005, 04:22 AM
Post #24


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



meh. easier to just copy his account info onto your commlink. unless they've got some kind of special hardware built in, the network won't be able to differentiate.
Go to the top of the page
 
+Quote Post
hahnsoo
post Sep 13 2005, 04:25 AM
Post #25


Mr. Johnson
******

Group: Dumpshocked
Posts: 2,587
Joined: 25-January 05
From: Berkeley, CA
Member No.: 7,014



QUOTE (mfb)
meh. easier to just copy his account info onto your commlink. unless they've got some kind of special hardware built in, the network won't be able to differentiate.

Well, spoofing a datatrail only adds +1 per hit to the threshold on a trace. Using his commlink to do operations just makes it so that if they do trace you, it will go back to the dupe's location instead of you and your team's.
Go to the top of the page
 
+Quote Post

2 Pages V   1 2 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 26th April 2024 - 12:06 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.