Help - Search - Members - Calendar
Full Version: Rigging/Hacking: help!
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2
Aaron
QUOTE (wind_in_the_stones)
Thanks for the info about network communication. Would you please explain hacking?

And in game terms, what does hacking get you, as opposed to simply spoofing?

I am not sure you understand the question. If this is the case, then to better understand your question, please replace the word "hacking" with "dancing," and the word "spoofing" with "doing a polka."

As I understand it, hacking is everything that a hacker does in Shadowrun. That Spoof program is a "Hacking Program," according to the RAW. As is Exploit and Attack.

In real life, the term "hacking" means several things, least of all illegally breaking into computer systems (this link leads to more detailed descriptions of the word "hacker"). The more accurate term for that would be "cracking," but a decision was made within FanPro to just stick with modern popular myth and call all of it hacking (and I can't blame them, really), and since they do, I will, too.

Basically, a hefty percentage of Matrix actions listed on page 219 are hacking. Practically every use of those programs listed on page 226 and 227 as "Hacking Programs" could be considered hacking.

I believe what you mean by "hacking" is using the Exploit program to find a way to access a node. A real-life example of this action would be the use of a combination of a program called nmap and sshnuke, a program that utilizes the now (in)famous SSH exploit, known to those in the biz as the SSH CRC-32 bug. It would look something like this:

CODE
          state       service
22/tcp     open        ssh

No exact OS matches for host

nmap run completed -- 1 IP address (1 host up) scanneds
% sshnuke 10.2.2.2 -rootpw-"Z1ON0101"
Connecting to 10.2.2.2:ssh ... successful.
Attempting to exploit SSHv1 CRC32 ... successful.
Reseting root password to "Z1ON0101".
System open: Access Level (9)
% ssh 10.2.2.2 -l root
root@10.2.2.2's password:

This might look familiar to Matrix fans; it's the same exploit that was used by Trinity in "The Matrix Reloaded," and it's what a real hacking job would look like (the Brothers Wachowski were given mad props at the time by the hacker community for their accuracy and research). The nmap program looks for vulnerable open ports in a target, and the sshnuke program was designed to exploit the CRC-32 bug. Shadowrun's Exploit program would include the functionality of both of these programs, along with a whole library of others.

Now, look at the nmap output above. It shows that there is a port (a potential connection) in the target that is open and listening for input. If this port was closed, and no other ports open, sshnuke would not work, since the target could not execute the commands that sshnuke sent it because it would never get a chance to read them. If the router attached to the open port only allowed traffic through that was from a certain address, one would have to perform IP spoofing on packets in order to have the router forward the traffic and have sshnuke work; in game terms, one would have to Spoof the node in order to Exploit it.

So the short answer (too late) is yes, you need to Spoof a node that is exclusively subscribed in order to use Exploit whether you do it the slow romantic way (Probing the Target) or the hard and fast way (Hacking on the Fly). In order to run the Spoof, you need to have a Matrix ID that won't get ignored, and to get that you either need to use Decrypt and Sniffer to get the ID from the traffic to and from the drone, or Track and Analyze to find the rigger in the Matrix and get the ID that way; this assumes that there is any traffic going to and from the drone (if they're not talking, you're kinda screwed).

Incidentally, the concept of subscribing to increase security has come up in other threads. The idea being that every member of the team subscribes their commlink exclusively to the team's hacker's commlink, so as to reduce the points of vulnerability. It's the same deal with the drones and the rigger.

QUOTE (wind_in_the_stones)
QUOTE (Aaron)

if it really was that easy to defeat a drone, why would riggers use them?

Sounds to me like you're trying to house-rule to cover a percieved game imbalance. nyahnyah.gif

Sounds to me like you're avoiding the question. =b

Plus, you prompt another question: when did I mention a house rule?
Aaron
Oh, I forgot to mention that some nodes you can simply start using Exploit on. These are the nodes that are looking for connections from the outside world, and have their functions severely limited by not being open to those connections. Such nodes include servers, libraries, garage door openers, vending machines, personal commlinks, taxi cabs, et cetera.

Drones, cop cars, cyberware, security cameras, weapons, and the like are all examples of nodes that would not be open to connections from the outside world, and would instead be subscribed (if not slaved) to a specific node.
CrimsonHawk
now i have been told something interesting an that is when your trying to hack a drone (on the fly) your doing it AR which means it takes Days... to take complete control over a drone because of the subscription list? now the hack on the fly spoof you could issue basic commands like land or reboot and such but not anything like attack this target and Higher functions? also there are degradation on most programs that according to the book every run you do drops it by one point? so a hacker would be putting out like 80k to 100k+ per run to be on the bleeding edge program wise and rebuild wise? also come units are like fingerprints and you need new comunits every run or you may get caught by spiders on the net?


so how many runs should I be looking into per month to play keep up for this? your basic hacker / drone runner

thank you any commits would be helpful cyber.gif
Serbitar
Good explanation Aaron. I think I will have to add an explantion like this to my upcoming SGM.
wind_in_the_stones
QUOTE (Aaron)

Now, look at the nmap output above. It shows that there is a port (a potential connection) in the target that is open and listening for input. If this port was closed, and no other ports open, sshnuke would not work, since the target could not execute the commands that sshnuke sent it because it would never get a chance to read them. If the router attached to the open port only allowed traffic through that was from a certain address, one would have to perform IP spoofing on packets in order to have the router forward the traffic and have sshnuke work; in game terms, one would have to Spoof the node in order to Exploit it.

So the short answer (too late) is yes, you need to Spoof a node that is exclusively subscribed in order to use Exploit whether you do it the slow romantic way (Probing the Target) or the hard and fast way (Hacking on the Fly). In order to run the Spoof, you need to have a Matrix ID that won't get ignored, and to get that you either need to use Decrypt and Sniffer to get the ID from the traffic to and from the drone, or Track and Analyze to find the rigger in the Matrix and get the ID that way; this assumes that there is any traffic going to and from the drone (if they're not talking, you're kinda screwed).

Thank you, this makes perfect sense and supports your position. But since the rules don't specifically state that you need to gain ID before attacking/exploiting (I again looked over the quotes you posted earlier, and none of them say that you must do so) I still believe that that would be a house rule. And that the rules writers were either unfamiliar with hacking or were trying for game balance. Or maybe that they were smoking crack, since my question remains - if you have an ID with which to spoof, why would you make an exploit test?

wind_in_the_stones
QUOTE (Aaron)
Oh, I forgot to mention that some nodes you can simply start using Exploit on. These are the nodes that are looking for connections from the outside world, and have their functions severely limited by not being open to those connections. Such nodes include servers, libraries, garage door openers, vending machines, personal commlinks, taxi cabs, et cetera.

Drones, cop cars, cyberware, security cameras, weapons, and the like are all examples of nodes that would not be open to connections from the outside world, and would instead be subscribed (if not slaved) to a specific node.

Okay, this is important. This might answer my question. If that's the way things should work, the game designers really missed the boat on writing such a rule. That would have been a very obvious sentence or two.

So we could say that any node that expects communication with outside entities will not have a subscription list, and therefore be vulnerable to an exploit. And that exploiting is useless against a subscribed one.
wind_in_the_stones
QUOTE (CrimsonHawk @ Jun 18 2006, 06:09 AM)
now i have been told something interesting an that is when your trying to hack a drone (on the fly) your doing it AR which means it takes Days... to take complete control over a drone because of the subscription list? now the hack on the fly spoof you could issue basic commands like land or reboot and such but not anything like attack this target and Higher functions? also there are degradation on most programs that according to the book every run you do drops it by one point? I'm not sure about the spiders finding you, either.

Not that I'm aware of.

You can do anything in AR that you can do in VR, you're just using your meat initiative, and you lose the extra passes. If you spoof your ID with the rigger's you can issue any command that he can. You just can't jump into it, and control it virtually. Drones usually have programs that allow them to follow complex commands such as "shoot that guy". I'm not able to find anything about program degradation. Are you thinking of SOTA?
Aaron
QUOTE (wind_in_the_stones)
[...] since my question remains - if you have an ID with which to spoof, why would you make an exploit test?

wind_in_the_stones.biscuit++;
Aaron
QUOTE (wind_in_the_stones)
Okay, this is important. This might answer my question. If that's the way things should work, the game designers really missed the boat on writing such a rule. That would have been a very obvious sentence or two.

Actually, they did say that, but you have to put together all of the stuff I quoted a few posts back. I suspect what happened was the same sort of thing that's happened before: the writers knew what they were talking about, the editors knew what the writers were talking about, and so it appeared that the whole thing made sense.

QUOTE (wind_in_the_stones)
So we could say that any node that expects communication with outside entities will not have a subscription list, and therefore be vulnerable to an exploit. And that exploiting is useless against a subscribed one.

wind_in_the_stones.biscuit++; // that's two so far, good work!

Actually, Exploit isn't useless against an exclusively subscribed node, just less efficient.
Serbitar
QUOTE (wind_in_the_stones @ Jun 18 2006, 11:10 AM)
[...] since my question remains - if you have an ID with which to spoof, why would you make an exploit test?

To gain an account?

ID = IP or mac-address
exploit = gain an account

And ID and a system account are two totally uncorrelated things. Even if my wirelss network is only accepting certain IDs, it will still check wheter the guy/device/node/whatever login on via this ID has a valid user/system/admin account.

This is also the case in todays networks. Nothing very nonstandard of difficult.
wind_in_the_stones
QUOTE (Serbitar)
To gain an account?

ID = IP or mac-address
exploit = gain an account

And ID and a system account are two totally uncorrelated things. Even if my wirelss network is only accepting certain IDs, it will still check wheter the guy/device/node/whatever login on via this ID has a valid user/system/admin account.

You had me there, for a minute. I thought, oh yeah, if you're spoofing, you have to make a test for every command issued. And once you've successfullly hacked, you can do anything you want to the node. But then I realized your first spoof command is going to be to add your rigger to its subscription list. And that's effectively an account.

Or am I missing something?
wind_in_the_stones
QUOTE (Aaron)
Actually, they did say that, but you have to put together all of the stuff I quoted a few posts back. I suspect what happened was the same sort of thing that's happened before: the writers knew what they were talking about, the editors knew what the writers were talking about, and so it appeared that the whole thing made sense.


And not only that, you knew what they were talking about, apparently. So you read a lot into those quotes from the BBB. I can't make them mean what you say they mean. Not without a stretch, anyway. They support my position at least as well as yours.
Aaron
QUOTE (wind_in_the_stones)
But then I realized your first spoof command is going to be to add your rigger to its subscription list. And that's effectively an account.

Or am I missing something?

You're missing something. Sorry.

Adding your ID to the subscription list just makes the target node stop ignoring you. But once you've been added, you can start Exploiting. This is, of course, assuming that the rigger has given herself access to change the subscription list (as opposed to making that something she has to log in as an admin or have a passkey to do).
Aaron
QUOTE (wind_in_the_stones)
QUOTE (Aaron @ Jun 18 2006, 11:59 AM)
Actually, they did say that, but you have to put together all of the stuff I quoted a few posts back. I suspect what happened was the same sort of thing that's happened before: the writers knew what they were talking about, the editors knew what the writers were talking about, and so it appeared that the whole thing made sense.


And not only that, you knew what they were talking about, apparently. So you read a lot into those quotes from the BBB. I can't make them mean what you say they mean. Not without a stretch, anyway. They support my position at least as well as yours.

I cheated. I get paid to teach this sort of thing. =)
Navaruk
So what happens when I delete the subscription list? Does the node default to an open status so just anybody hook up to the drone or is it basically offline?
Aaron
QUOTE (Navaruk @ Jun 18 2006, 11:53 PM)
So what happens when I delete the subscription list? Does the node default to an open status so just anybody hook up to the drone or is it basically offline?

Good question to ask. That's probably a judgement call for your GM to make.

In real life, the answer is both (useful, huh?). This is because the creation of what Shadowrun calls a subscription list is separate from the implementation of that list. So if you tell it to stop using that particular list, then it will become open. If you merely erase the list it's using, it will discard all traffic.

So, yeah. Up to your GM. If I was the GM, I'd have you make a Logic + Operating Systems Knowledge, or Logic + Hacking, or something, to give you a chance of getting the desired result.
Nim
QUOTE (Aaron @ Jun 18 2006, 12:13 AM)
If the router attached to the open port only allowed traffic through that was from a certain address, one would have to perform IP spoofing on packets in order to have the router forward the traffic and have sshnuke work; in game terms, one would have to Spoof the node in order to Exploit it.

It's a minor nit, but since we're talking about wireless.... each node with a receiver has to run its own filter. A better real-world model for a subscribed node would be a server with ssh turned on, but a software firewall (ipchains, for example) configured to ignore connection attempts that don't come from a specific list of IPs.

If the node is going to receive ANY traffic, some piece of software on the node needs to examine each incoming message and decide whether or not to pay attention to it. One way to gain access to such a node would be to spoof your own identity (once you've figured out what ID it's looking for). In theory, though, you might also be able to take advantage of a vulnerability in the filtering software. (Just like, in the hardwired example you gave, you could in theory crack the router instead of spoofing)
The Jopp
Aaron, in your game I agree that you could play it your way, as long as you have fun but according to the RAW one can use Spoof, Hacking and Intercepting wireless signals to try taking over a drone, they are not immune to hacking and electronic warfare and there’s nothing in the rules saying that you need spoof before you hack.

There are however several simple ways of stopping rampant abuse of the above – orders.

It’s stated in the book that Agents understand any order given although they could take them a bit too literally.

Here are the actions and what one can do to stop it.

1. It can only take orders from it’s controlling persona (Spoof can stop that)

2. It will double-check the order with the controlling personas log file if said order has been sent (spoof will NOT work because of that). Also, add an order to IGNORE commands that stops it from checking the logfile or changing the subscription list

3. Intercepting signal and inserting an order (Illicit editing action of data) will fool drone with fake orders inserted in the controlling personas datastream.


4. Point 1 can stop 3 from working since the hacker don’t have the original log file and cannot fake the correct order history (drone could have a log file from the persona with several days of history.)

5. Hacking the drone takes time and it is rare that a hacker would make an exploit test and rather hack on the fly – which gives the drone several attempts to discover the intruder.


6. Running an agent on the matrix on a standard node (citywide signal node or suchlike) and give it an order to peek inside the drones node (within the subscription list of the drone) would give it additional defense and save up slots for autosofts as well. It could run permanent analyze checks and have attack programs ready.

On another issue: Can I spoof command to an agent?
Aaron
QUOTE (Nim @ Jun 19 2006, 07:57 AM)
It's a minor nit, but since we're talking about wireless.... each node with a receiver has to run its own filter. A better real-world model for a subscribed node would be a server with ssh turned on, but a software firewall (ipchains, for example) configured to ignore connection attempts that don't come from a specific list of IPs.

I have to disagree. The RAW states that commlinks are also routers. This makes sense for a ubiquitous wireless network; it becomes very easy to run such a network if every device can pass packets. I'd assert that only a tiny fraction of traffic that a single commlink encounters would actually be for that commlink, rather than traffic to be forwarded. If that capability was integrated into the commlink's central processing duties, it would be a terrible waste of resources, especially when the user wants it for something processor-intensive (like gaming or decrypting or compiling or something). More likely, the router functionality is part of the wireless tranceiver (analogous to a modern computer's network card).

Unless you are maintaining that a subscription list is unlike a modern ACL, then what you propose would not work. The packet in question never even gets looked at, only the network header. Modernly, it reads bytes six through nine (for the source address), and that's it.
Aaron
QUOTE (The Jopp)
Aaron, in your game I agree that you could play it your way, as long as you have fun but according to the RAW one can use Spoof, Hacking and Intercepting wireless signals to try taking over a drone, they are not immune to hacking and electronic warfare and there’s nothing in the rules saying that you need spoof before you hack.

Jopp, omae, I could respond to this, but I'd just be repeating every fraggin' thing I've been saying this entire thread, so I'll leave that as an exercise to the reader. And by that, I mean reader, not skimmer.

Also, let us not forget that "hacking" is, among other things, Spoofing and Intercepting (that one was a few posts back). Don't confuse Exploit with hacking.

QUOTE (The Jopp)
Here are the actions and what one can do to stop it.

1. It can only take orders from it’s controlling persona (Spoof can stop that)

But that's what I already ... I went over ...

...

*sigh*

Very nice, Jopp. Very succinct. Thanks.

QUOTE (The Jopp)
On another issue: Can I spoof command to an agent?

I don't see why not. Logically (meaning within the logical theoretical construct of the Matrix), a drone's Pilot and an Agent are identical, they just control different hardware.
Nim
QUOTE (Nim @ Jun 19 2006, 07:57 AM)
It's a minor nit, but since we're talking about wireless.... each node with a receiver has to run its own filter. A better real-world model for a subscribed node would be a server with ssh turned on, but a software firewall (ipchains, for example) configured to ignore connection attempts that don't come from a specific list of IPs.

Unless you are maintaining that a subscription list is unlike a modern ACL, then what you propose would not work. The packet in question never even gets looked at, only the network header. Modernly, it reads bytes six through nine (for the source address), and that's it.


I didn't write the second paragraph of that, so I'm not sure where it came from. Is it part of your response, and accidentally inside the quote-tag?

QUOTE (Aaron)

I have to disagree. The RAW states that commlinks are also routers. This makes sense for a ubiquitous wireless network; it becomes very easy to run such a network if every device can pass packets. I'd assert that only a tiny fraction of traffic that a single commlink encounters would actually be for that commlink, rather than traffic to be forwarded. If that capability was integrated into the commlink's central processing duties, it would be a terrible waste of resources, especially when the user wants it for something processor-intensive (like gaming or decrypting or compiling or something). More likely, the router functionality is part of the wireless tranceiver (analogous to a modern computer's network card).


Actually, I agree with everything you've said here. I didn't intend to suggest that the filtering had to run on the main processor as opposed to a dedicated sub-processor...merely that it has to be done within the commlink itself, SOMEWHERE. It can't rely on a different node to do its filtering for it. And it can't be entirely hard-wired, because you need to be able to configure the contents of the list at run-time.
Nim
QUOTE (Aaron)
Oh, I forgot to mention that some nodes you can simply start using Exploit on. These are the nodes that are looking for connections from the outside world, and have their functions severely limited by not being open to those connections. Such nodes include servers, libraries, garage door openers, vending machines, personal commlinks, taxi cabs, et cetera.

Only one of these I disagree on is the garage door openers. By design, a garage door receiver is intended to respond to only one or two dedicated transmitters. It's pretty much a perfect example of a subscribed node. Unless you meant a public pay-garage, rather than a home one?
Aaron
QUOTE (Nim)
I didn't write the second paragraph of that, so I'm not sure where it came from. Is it part of your response, and accidentally inside the quote-tag?

Fixed. Weird, it looked okay in the preview.

QUOTE (Nim)
Actually, I agree with everything you've said here. I didn't intend to suggest that the filtering had to run on the main processor as opposed to a dedicated sub-processor...merely that it has to be done within the commlink itself, SOMEWHERE. It can't rely on a different node to do its filtering for it. And it can't be entirely hard-wired, because you need to be able to configure the contents of the list at run-time.

I think I'm hung up on the term, "filtering." To call the thing that an ACL or subscription list does "filtering" is somewhat inaccurate, but it occurs to me that such nit-picking (Nim-picking?) doesn't really add anything to the discussion, so I'll shut up about it.

Anyway, my original point was that the packets carrying the Exploit commands/probes/unagi would never reach a place where they could do harm, because it would get discarded before it got that far. It might help to explain that there are actually multiple layers of encapsulation at work in network communications (encapsulated in a spoiler for those who like to skim).

[ Spoiler ]

QUOTE (nim)
Only one of these I disagree on is the garage door openers. By design, a garage door receiver is intended to respond to only one or two dedicated transmitters. It's pretty much a perfect example of a subscribed node. Unless you meant a public pay-garage, rather than a home one?

Okay, maybe not garage door openers. Except the public ones, as you say.
Serbitar
My view of the whole situation. I tried to find a consistent solution that is sensible and does not violte SR4 RAW. Maybe somebody finds it interesting.
Nim
*grin* Good explanation. And yeah, this is getting pretty far afield, but I'm enjoying the conversation smile.gif

What I was getting at, though, is that in a wireless network, the sender controls every aspect of the encapsulation. There aren't (or at least, needn't be) any intermediaries between the original sender and the final recipient. So, you can't trust the outer envelopes to be any cleaner than the inner message - the Bad Man sending the message could have fiddled with any layer of the network stack that he wanted to.

IF, and this is a big if, there's a vulnerability in the implementation of the ACL itself (it falls over when it receives a packet with a magic number of bits, or it stores the packet in a fixed-length buffer without checking the size first, or it does something similarly boneheaded), then you've got a problem. The reason it's a big if, though, is that that sort of thing is usually more compact and easy to debug than something like sshd would be. And if it's well-designed, then when it breaks it ends up passing NOTHING along, rather than everything, and you're inconvenienced but not compromised.
wind_in_the_stones
QUOTE (Aaron)
Adding your ID to the subscription list just makes the target node stop ignoring you. But once you've been added, you can start Exploiting.

It seems to me, that if I'm on its subscription list, I can give the drone commands, and I no longer have to make spoof tests. Am I wrong about this too?
Aaron
QUOTE (wind_in_the_stones)
QUOTE (Aaron @ Jun 18 2006, 09:40 PM)
Adding your ID to the subscription list just makes the target node stop ignoring you. But once you've been added, you can start Exploiting.

It seems to me, that if I'm on its subscription list, I can give the drone commands, and I no longer have to make spoof tests. Am I wrong about this too?

Sort of.

You have to spoof it if you want it to follow a command. All being on the subscription list does for you is not have the drone ignore you out of hand. Once you're on the list, then you can start the Exploit or what have you.
Aaron
QUOTE (Nim)
What I was getting at, though, is that in a wireless network, the sender controls every aspect of the encapsulation. There aren't (or at least, needn't be) any intermediaries between the original sender and the final recipient. So, you can't trust the outer envelopes to be any cleaner than the inner message - the Bad Man sending the message could have fiddled with any layer of the network stack that he wanted to.

Um ... huh? Are you sure about that?

If "every aspect of encapsulation" is only controlled at the origin, it wouldn't work. Each end of the communication, and every step in between, has to be equally responsible for operating the proper network protocol (both routed and routing) or it don't work. It's like playing a game of telephone, except the players are from all around the world, and the first person is the only one that gets to pick what language will be used; it might work, but it probably won't.

While there doesn't have to be an intermediary between the sender and the receiver, it's faster if you're able to route your message through multiple routes at once. You gain a little bit in speed, and a lot more in security and error-checking.

As far as the trustworthiness of the "outer envelope" is concerned, there are plenty of ways to authenticate an envelope. If you're using encryption, you could encrypt the lower-level headers and then check it against the outer header to validate the whole packet. You could also include encrypted sign-countersign data using something like a one-time pad.

With wireless communication, though, you need encapsulation on both ends. Ever notice how 802.11g is clocked at 54 Mbps but you never even get close to that speed? That's because the best you can get is actually 26 Mbps, because every packet sent requires that the receiver double check that the packet arrived intact, which more or less doubles the traffic required per unit data transmitted.

QUOTE (Nim)
IF, and this is a big if, there's a vulnerability in the implementation of the ACL itself (it falls over when it receives a packet with a magic number of bits, or it stores the packet in a fixed-length buffer without checking the size first, or it does something similarly boneheaded), then you've got a problem.

Meh. Maybe. I think you might be fishing a bit, though.
Nim
QUOTE (Aaron)

Meh. Maybe. I think you might be fishing a bit, though.

At this point, probably smile.gif We've also wandered totally away from actual SR-related topics.

QUOTE
If "every aspect of encapsulation" is only controlled at the origin, it wouldn't work. Each end of the communication, and every step in between, has to be equally responsible for operating the proper network protocol (both routed and routing) or it don't work.


But in a distributed wireless network, if the original sender and the receiver are within range of each other, there /are/ no steps in between, right? Obviously the sender can't grossly violate the protocol, or the packets it's sending will be meaningless. But no trusted (or at least, neutral) third party has encapsulated that message. They could flood you with as many malformed packets as they liked.

If the sender and receiver were far enough away from each other that the packet had to be routed through intermediate nodes, THEN encapsulation might protect you (at first glance) from malicious content.

QUOTE

While there doesn't have to be an intermediary between the sender and the receiver, it's faster if you're able to route your message through multiple routes at once. You gain a little bit in speed, and a lot more in security and error-checking.


That's certainly true with wired communication, because the actual throughput on any given intermediary link may be lower than your own maximum rate of transmission. At that point, splitting the message across multiple routes will get the whole message there faster. In a wireless network, though, I don't see how adding addition intermediaries (assuming the sender and receiver are within clear trransmission range of each other) can do anything but slow the process down.

Or am I missing something here? I'm honestly not JUST trying to be difficult.
wind_in_the_stones
QUOTE (Aaron)
You have to spoof it if you want it to follow a command. All being on the subscription list does for you is not have the drone ignore you out of hand. Once you're on the list, then you can start the Exploit or what have you.

*slaps forehead* Right. Subscribing is like putting each other on your AIM buddy list. All it means is that the drone can hear you, not that it will listen. This would have been a lot simpler if that had occurred to me a couple of pages sooner. I was thinking that a subscription is the channel the rigger uses to issue commands. I think. It's hard to remember what I was thinking last week. Or the week before.

So...

What does the subscription list have to do with it? When you're spoofing, you don't need to be on it, because you're pretending that you're the guy who is on the list.

And back to my original question: what does it take to give control of the enemy drone to my rigger? Once I've hacked into it, I can transfer command rather easily, I'd imagine. Is it the same for spoofing? This seems like a simple decision, but I'd like to get someone else's opinion.
Aaron
QUOTE (Nim)
That's certainly true with wired communication, because the actual throughput on any given intermediary link may be lower than your own maximum rate of transmission. At that point, splitting the message across multiple routes will get the whole message there faster. In a wireless network, though, I don't see how adding addition intermediaries (assuming the sender and receiver are within clear trransmission range of each other) can do anything but slow the process down.

Or am I missing something here? I'm honestly not JUST trying to be difficult.

Assuming a simple protocol, like the sort we use now-a-days, yes, it would be faster. I can think of a few reasons why to purposely send packets via multiple routes on purpose, especially when wireless is a) ubiquitous and b) security-critical.
Aaron
QUOTE (wind_in_the_stones)
And back to my original question: what does it take to give control of the enemy drone to my rigger? Once I've hacked into it, I can transfer command rather easily, I'd imagine. Is it the same for spoofing? This seems like a simple decision, but I'd like to get someone else's opinion.

It comes down to what the drone has been configured to accept as commands. A rigger concerned about security would allow himself to send operational commands, but require higher-level access, Security or Admin, to do anything else, such as give accounts. Ideally, also requiring a passkey, for that added kick.

The long and the short of it is, giving commands is usually enough, at least for a couple of turns, until the rigger sends a command to switch IDs or something like that.
wind_in_the_stones
So basically, you've got to hack it, and set up an account for your rigger. And take away the rigger's existing account.

Thanks a lot for your patience, Aaron.
Aaron
QUOTE (wind_in_the_stones)
So basically, you've got to hack it, and set up an account for your rigger. And take away the rigger's existing account.

More or less. Again, though, usually by the time you've done all that, your Street Sammie has torn it to shreds, or your magician has managed to beat the 4+ threshhold with a damaging spell, or something.

QUOTE
Thanks a lot for your patience, Aaron.

Null perspiration, omae. Didn't I mention that I teach for a living?
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012