The Commlink used as a Repeater, Just what it says |
The Commlink used as a Repeater, Just what it says |
Sep 12 2005, 04:49 PM
Post
#1
|
|
Running Target Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 |
He-Man can hack a commlink and then unsubscribe the poor sap carrying it and then subscribe himself. His own commlink and the target commlink must both be within each other's signal range.
Once the target commlink is hacked He-Man uploads his hacking programs and uses the target commlink to hack into building security which is within the target commlink's range but not his own personal commlink's signal range. He-Man now has 1 global PAN (so he can be hacked and traced normally) but his range is now based on the signal rating of *either* commlink. This seems valid to me, am I missing anything? The only thing I can think of is that a commlink subscribing a second commlink would violate the only-one-firewall rule, which possibly would require unloading the firewall on the target commlink (its a program, after all) and then hacking in using his personal commlink's firewall as the PAN firewall. Legit or not? |
|
|
Sep 12 2005, 04:53 PM
Post
#2
|
|
Moving Target Group: Members Posts: 875 Joined: 16-November 03 Member No.: 5,827 |
It seems legit.
SYL |
|
|
Sep 12 2005, 04:58 PM
Post
#3
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Has a good beat, I can dance to it. Applications of the technique may need to be carefully prepared in advance, and the wallpaper or paint or whatever it was that reduced wireless signals within a building could put a big crutch in pulling this one off. Plus, if you dump the original person from their commlink, wouldn't they notice? And, I'd definately apply the +6 for admin access to the commlink (as it's an everday device and thus only has amin access).
|
|
|
Sep 12 2005, 05:05 PM
Post
#4
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Keep in mind that the hacked commlink will usually have a smaller Response rating, though - so limiting the usage of all Programs.
|
|
|
Sep 12 2005, 05:33 PM
Post
#5
|
|
Neophyte Runner Group: Members Posts: 2,086 Joined: 26-February 02 Member No.: 364 |
Conceptually, I like the feel of this. Very much reminds me of the present day technique of pwning some poor n00b's computer and turning it into a zombie box to launch your nefarious schemes from.
Though these days, it's usually hundreds of poorly secured boxes getting co-opted all at once by a virus or other malware, and then the whole colection of pwned machines being used for a distributed attack. |
|
|
Sep 12 2005, 05:38 PM
Post
#6
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
..that would be inserting Agents into named systems, and subscribing them as one... sweet.
Talking about repeaters... yet I missed a single device just boosting signal strenght. Shouldn't it be possible though, to just use a comlink a booster station? (This becoms relevant to users of implanted commlinks, as their signal rating should be limited to 2) |
|
|
Sep 12 2005, 05:54 PM
Post
#7
|
|
Man In The Machine Group: Dumpshocked Posts: 2,264 Joined: 26-February 02 From: I-495 S Member No.: 1,105 |
But suddenly the idea of hacking 200 people acros the city and creating your own WAN seems wicked entertaining.
|
|
|
Sep 12 2005, 07:33 PM
Post
#8
|
|
Moving Target Group: Members Posts: 909 Joined: 26-August 05 From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.) Member No.: 7,626 |
Could also work as a decoy; give the troll a spare comm to carry around just for use as a relay. You can stash an Agent program on the spare instructed to crash the system or shut down all communication in the case of a breach. Maybe add a biomonitor to the link so if you passout it'll be able to shut things down. Should you get dropped by BlackOut/Hammer, any security that tries to access your Comm will have a nasty surprise.
And the reason I give it to the troll is in case they get a GPS fix on it via triangulation or breaking into it. |
|
|
Sep 12 2005, 07:51 PM
Post
#9
|
|
Immortal Elf Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
99% of the time, the signal rating of your commlink isn't going to matter. that's the whole point of mesh networking; everybody in the mesh acts as a mini-repeater as your packets get routed to where you want them to go. there's no real need to even unsubscribe the main user (and if you do, he'll just reset his commlink and boot you anyway), you can already accomplish the same level of anonymity just by spoofing your datatrail. it's a neat, clever way to do something that's already possible through much simpler means.
|
|
|
Sep 12 2005, 07:55 PM
Post
#10
|
|||||
Runner Group: Members Posts: 3,420 Joined: 30-October 03 Member No.: 5,776 |
That means you won't be accessing anywhere close to 200 people. |
||||
|
|||||
Sep 12 2005, 08:01 PM
Post
#11
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Not without 20 of your closest friends :D
|
|
|
Sep 12 2005, 08:02 PM
Post
#12
|
|
Hoppelhäschen 5000 Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Yes, you can - you can subscribe multiple Agents or Drones as one Subsription...
|
|
|
Sep 12 2005, 08:02 PM
Post
#13
|
|
Immortal Elf Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
actually, you could create a seperate-from-the-Matrix mesh network comprised solely of the commlinks you've hacked. just subscribe them to other commlinks you've hacked, which subscribe to yet others, which eventually you have subscribed.
granted, though, this network will take about six seconds to fall apart. that's about how long it takes to do a perception check to notice your commlink's on the fritz, and then reset it. |
|
|
Sep 12 2005, 08:04 PM
Post
#14
|
|||||
Neophyte Runner Group: Members Posts: 2,086 Joined: 26-February 02 Member No.: 364 |
Ah, but if you can only access System x 2 other comlinks, couldn't those comlinks also access that comlink's System x 2? Besides, we've seen examples in the past where limitations on how many things you can have on your subscriber network were bypassed; Deus had many more remote drones than would normally be allowed, springs to mind. As for the comlink's owner noticing that something's wrong with their comlink, couldn't you set up some sort of Virtual Machine that made it look like everything was ok, just running slower? |
||||
|
|||||
Sep 12 2005, 08:09 PM
Post
#15
|
|||
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
But you have to command them all to do the same thing. If you wanted those agents or drones to be doing different tasks, then it's 1 to 1 for subscriptions to drone/agent. |
||
|
|||
Sep 12 2005, 08:27 PM
Post
#16
|
|||
Neophyte Runner Group: Members Posts: 2,086 Joined: 26-February 02 Member No.: 364 |
Depending on what you wanted to use a large network of hijacked comlinks for, this might not be a problem. |
||
|
|||
Sep 12 2005, 08:27 PM
Post
#17
|
|
Technomancer Group: Retired Admins Posts: 4,638 Joined: 2-October 02 From: Champaign, IL Member No.: 3,374 |
Good point :D
|
|
|
Sep 12 2005, 09:16 PM
Post
#18
|
|
Moving Target Group: Members Posts: 293 Joined: 27-January 03 From: Kentucky, USA Member No.: 3,958 |
My big problem is that, once you unsubscribe the poor sap, he's going to be wondering why his AR glasses just went dead, he's not recieving messages, etc. and reboot the system. Meaning you'd have a minute or two to use the hacked unit before you're booted off again.
|
|
|
Sep 12 2005, 10:21 PM
Post
#19
|
|
Running Target Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 |
So it most valid for a team of shadowrunners who are geographically seperated. Sort of a leap-frog thing.
|
|
|
Sep 12 2005, 11:23 PM
Post
#20
|
|
Target Group: Members Posts: 34 Joined: 10-September 05 Member No.: 7,725 |
Hooray! Zombie-bot DDOS attack networks of the future!
|
|
|
Sep 13 2005, 12:23 AM
Post
#21
|
|||
Neophyte Runner Group: Members Posts: 2,086 Joined: 26-February 02 Member No.: 364 |
Again, I ask, wouldn't it be possible to set up a Virtual Machine that duplicates the functions that the comlink was providing for its legitimate user, but with a diminished processing capcity? Sure the guy might notice that his response has gone sluggish, but it'd be less obvious than a total loss of functionality. |
||
|
|||
Sep 13 2005, 02:11 AM
Post
#22
|
|
Moving Target Group: Members Posts: 909 Joined: 26-August 05 From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.) Member No.: 7,626 |
I think the easier thing to do is not do anything to alert the user. The zombie-spam bots work just fine for the idiot Comcast user who wants to get email and surf the web for porn. It may be a tad bit slower at times but he won't really be able to tell that it's not the sites he's visiting.
From my read of the rules, the use of a Comm's standard functions cause no load. Meaning you can have your AR glasses, headphones, gloves, and walk around IM-ing, listening to "the radio", etc without running a single System-draining application. Hackers will have full use of the CPU for their own nefarious needs. At the very worst, they'll be at Response-1. |
|
|
Sep 13 2005, 02:14 AM
Post
#23
|
|||
Mr. Johnson Group: Dumpshocked Posts: 2,587 Joined: 25-January 05 From: Berkeley, CA Member No.: 7,014 |
I can imagine a scenario where the runners knock out a scientist/guard/lackey and then the hacker does exactly what is stated above. The commlink would still be on (perhaps not if it was a cyber-commlink, but you'd select a target with a non-cyber one anyway), and the hacker can masquerade as the lackey's commlink that way in secured internal systems. If it gets traced, it goes back to the lackey (dumped into a convenient closet somewhere). |
||
|
|||
Sep 13 2005, 04:22 AM
Post
#24
|
|
Immortal Elf Group: Members Posts: 11,410 Joined: 1-October 03 From: Pittsburgh Member No.: 5,670 |
meh. easier to just copy his account info onto your commlink. unless they've got some kind of special hardware built in, the network won't be able to differentiate.
|
|
|
Sep 13 2005, 04:25 AM
Post
#25
|
|||
Mr. Johnson Group: Dumpshocked Posts: 2,587 Joined: 25-January 05 From: Berkeley, CA Member No.: 7,014 |
Well, spoofing a datatrail only adds +1 per hit to the threshold on a trace. Using his commlink to do operations just makes it so that if they do trace you, it will go back to the dupe's location instead of you and your team's. |
||
|
|||
Lo-Fi Version | Time is now: 26th April 2024 - 12:06 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.