Help - Search - Members - Calendar
Full Version: Decking tutorial
Dumpshock Forums > Discussion > Shadowrun
Platinum
I am going over the sr3 rules for decking again, and I need some clarification on a few things, and I am trying to write up a quick tutorial.

Your deck is pretty hot and has 8/6/6/6/6. Computer skill of 6.

Host is a soft system Orange-6 9,8,7,8,7
Security sheaf:
3 Probe 5
7 Probe 7
10 Killer 8, passive
13 Killer 10, active
16 shutdown

You pull up to the SAN and you see a gate attendant, and a hell hound(6)blaster just inside.

You have your sleaze (5) and deception(6) fired up, and you run your "logon to host"(access) test.

It is an opposed test.
Decker gets 6 + hacking pool TN 3 {Access rating(9) - deception(6) = 3}
System gets its rating(6) TN 6 {Masking(6) + Sleaze(5) /2 =5.5 round up}
(personally I am just going to just drop the sleaze program, seems silly to me)

Any successes by host are added to Security Tally.
The decker passes the gate now he can fire up the Analyze(4) try an figure out the hell hound.

Does the decker use the control rating of the host or the rating of the IC as the base TN?
Assuming rating of IC:
He runs the Analyze IC control test Sensor rating (6) TN 4 {IC rating(cool.gif - Analyse(4)}

Assuming control rating:
He runs the Analyze IC control test Sensor rating (6) TN 5 {IC rating(9) - Analyse(4)}


Is this an opposed test?
System rating TN MCPC of deck? Would the system counter successes still add to the tally?

Satisfied that he knows what the hound is, our decker decides to search for a phone log file for the date 1/1/61.

He runs an Index test Computer(6) + hacking TN 5 {Index Rating(cool.gif - Browse(3)} VS Security rating(6) TN 6 {Masking(6) + Sleaze(5) /2 =5.5 round up}

Any successes by host get added to tally.

Is this close so far? more to come.


silvermain
We had a great thread dealing with the ins and outs of deckingidiots guide to the matrix. You should be able to find a lot of info from there.
Slump
Also, if you use the rules for creating a random security sheaf, they are way, way longer than the sample ones. Even a red host gets to a tally of like 50-70 before shutting down, and a green host can hit a tally of 200 before shutting down, by the dice.

I wrote a program for my TI-85 to dynamically generate security sheafs. You put in the color code and the system rating. It comes back with what is triggered when the tally reaches the next trigger step. You hit enter, and it'll give you the next trigger step and IC triggered. It'll also tell you when alerts happen and the shutdown.

Synner
QUOTE (silvermain)
We had a great thread dealing with the ins and outs of decking idiots guide to the matrix. You should be able to find a lot of info from there.

Ah... the fond memories, back when I had time to spend on stuff like that.
Platinum
QUOTE (silvermain)
We had a great thread dealing with the ins and outs of deckingidiots guide to the matrix. You should be able to find a lot of info from there.

Slump:
what is the URL?

Thanks guys.

I came across it once before, but when I searched on decking, tutorial, and a few other keywords, I could not find it. Thanks for the link.
Platinum
Any status on the archives? Those are the first few links in the posts. would be nice to get those old threads saved somewhere.
Platinum
Questions about decking:

QUOTE (Synner)

[edit] Since Probe is reactive IC the GM just makes a secret Sensor Test (SR3 page 209) for the decker (4) against a Target number equal to the IC's rating ( 8 ), the decker gets very lucky and rolls 2 successes finding out that this Recepcionist Icon is a Cutie8.1 Probe IC and is asking for the passcode that identifies him as a legitimate user. If he had failed the test, the recepcionist would have just noted his unauthorized presence, said nothing and the IC would have remained undetected.[/end edit]

You now have a choice:
a) you either enter Cybercombat and try to nuke the Probe IC and then surpress it or;
b) you don't reply and from that point on the Host adds the Probe's rating ( 8 ) to all Security Rating (9) rolls against the decker's Detection Factor (7). Meaning that after Probe is triggered the System starts rolling 17 dice every System Operation you make.

Note - Although I don't think it's clearly stated anywhere that I recall, IMHO it should be assumed that possessing a Validated Account (see above) means you can show Probe IC a valid passcode and the IC returns to its passive state. This is another good reason to do a recon hack.
Note2 - When I've had time to work out the metaphor before hand and I think the decker is in the mood for some more color, I use the IC or Program's rating as a version number so I don't have to break from in character description (ie. a "Cutie8.1 Probe" for a Probe - 8 IC).


Is there some utility that you can use to try and sleaze the probe and fake credentials? Which if successful it would reset the probe back to passive, but also add to the security tally. Could you do another logon test?
:edit: removed sophisticated
Kagetenshi
"More sophisticated"?

~J
Platinum
Last comment removed, anyone care to help with the question?
maneius
Nothing to see here. Ignore me.
Kagetenshi
If you're asking about the rules as they are now, the answer is "no". If you're asking whether it might make sense to add rules to do that, I'll need to know what you want to achieve with that to comment.

~J
Platinum
Well, what I am trying to achieve is a way to passively circumvent the IC.

What I was thinking should happen is you have the ability to ask for credentials. (some details of your activity are suspicious, so they ask for a revalidation)
The odds are that this will increase the security tally because this will be a system test (essentially another logon test). If the decker succeeds, the probe goes passive again but the odds are that the system will ratchet up some additional successes and increase the security tally. (possibly triggering more ic, like a trace, which is not a big deal if you are a legit user) If the decker ignores the request.. then the tally goes up by the probe's rating. Or you can attack it, then suppress it.
Kagetenshi
With probe IC, the ways to accomplish that are ignoring it or logging off and trying later when things calm down. IMO it doesn't make sense to be able to make things calm down, on account of the system already having detected suspicious behaviour.

Though I think ultimately this comes down to the conflict between decker-has-tally (in which case the probe really is responding to you personally) and system-has-tally (in which case the probe is responding to suspicious activity, and if you prove you're legit that just means it has to look elsewhere (while it continues watching you) to find the source of the activity).

~J
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012