Help - Search - Members - Calendar
Full Version: Hacking using airwaves but no matrix
Dumpshock Forums > Discussion > Shadowrun
Wasabi
The SR2 and SR3 rules had a provision for hacking in through cameras and such in a world where everything was wired. It made sense. With the world now being wireless, however, the validity of some methods of entry seem odd. Specifically, lets say two people have a commlink. These commlinks have some cyberware, some gear, and each other subscribed. There is no matrix connection.

An enemy hacker uses Sniffer to monitor the airwaves and detects their conversation. Not happy enough with jamming or listening in, the enemy hacker decides he'd like to put an agent on their commlink to record everything they do. Sprites with the Cookie power wouldn't work because when they have no matrix connection Sprites de-rez.

Given this situation, do the two commlinks that lack a matrix connection on their subscription list have the ability to be hacked into merely by their transmissions to each other?
Rotbart van Dainig
No, because Man-in-the-Middle attacks only have rules for wired connections.
Fuchs
The logical consequence would be though that most people on both sides of the law would use such a connection to network, and connect to the matrix through a a heavily-guarded single node.

So, all members of a team would only be subscribed to each other, and their matrix link would be run through the hacker's main commlink, or even a remote-server placed in a vehicle or secure shelter, and choke-full of IC and agents, or even hackers.
Cthulhudreams
I thought you totally could by sniffing their traffic, decrypting it, spoofing yourself as one of the items subscribed then hacking yourself into a node from there?
Buster
Quick FYI: You don't need to be subscribed to communicate via commlink. That's considered normal use of the device. The only reason someone would need to subscribe to your commlink is if they needed User level or higher functions to manage the device. For example, your secretary would need to subscribe to your commlink and be given User access to manage appointments on your calendar. You might want to give her Security access to screen calls and route messaging. You would have Admin access to add/remove/modify accounts, turn off the firewall, turn the device on/off, etc.

Also, there aren't any rules for turning off subscription, but you can turn off wireless. Your commlink is almost a total waste at that point except where you can connect it to the matrix via skinlink/jack.
Cthulhudreams
QUOTE (Buster)
Quick FYI: You don't need to be subscribed to communicate via commlink. That's considered normal use of the device. The only reason someone would need to subscribe to your commlink is if they needed User level or higher functions to manage the device. For example, your secretary would need to subscribe to your commlink and be given User access to manage appointments on your calendar. You might want to give her Security access to screen calls and route messaging. You would have Admin access to add/remove/modify accounts, turn off the firewall, turn the device on/off, etc.

Also, there aren't any rules for turning off subscription, but you can turn off wireless. Your commlink is almost a total waste at that point except where you can connect it to the matrix via skinlink/jack.

Couldn't you set a device to only transact with subscribed devices, hence spoof? This is even vaguely refered to in the PAN modes section under Passive. Also under the spoofing your comm code bit too.

Wasabi
Subscribing bypasses the fact the runners have their commlinks running in Hidden mode.
deek
QUOTE (Rotbart van Dainig)
No, because Man-in-the-Middle attacks only have rules for wired connections.

I just want to oppose this.

I thought that given the above example, with the two, non-matrix connected commlinks, as long as you were within signal range, and had a strong enough signal range yourself, you would follow normal hacking rules, thus acting similar to a wired connection.

In this case, the air is your wire, and none of it requires matrix access...
Rotbart van Dainig
Though so, too... but the actual rules for Sniffer on wired and wireless are different.
deek
QUOTE (Rotbart van Dainig)
Though so, too... but the actual rules for Sniffer on wired and wireless are different.

I just looked this up and yes, Sniffer rules are different between wired and wireless, but you can still hack in the above example as long as everyone is within Signal range. So, man-in-the-middle attacks don't require matrix connectivity...unless you have a special definition to man-in-the-middle attacks...
otakusensei
I thought the rules were pretty clear. They only talk about one level of communication between devices, and that's matrix level. There's more traffic going back and forth and the commlinks are not acting as walkie talkies. If you had a couple of simple radios it would be different, but these are two devices made to setup and share a matrix connection between themselves.
In short, yes, you could sniff and exploit and load an agent onto the commlinks, but you would have to exploit each one individually.
Blade
To answer the opening question:

yes, commlinks can connect to the Matrix but can also create ad-hoc network (network between machines without a central access point). You can do the same with Wifi today: you can connect your computer to the internet (or a local network) by connecting to an Access Point but you can also connect directly to another wifi computer (or device). You can even have 3 computer form a network together this way.

So you can have a hacker inserting himself in the ad-hoc local network created by two commlinks.
otakusensei
Blade is right, but it should be noted that the default connection type for the wireless martix is ad hoc. They do talk so much about the meshing, don't they wink.gif
deek
Looking at page 225 (Intercepting Wireless Signals), I think gives me a slightly different angle than I earlier stated. And really, it comes down to defining what the OP meant by hacking.

Per RAW, you can listen in, edit, block, etc the traffic between the two devices...but, it looks like you wouldn't be able to upload an agent or access the subcription list. You could spoof the other device and if they receving node accepts the request to upload the agent, I suppose you could do that, but it wouldn't be like "Hacking on the Fly" and accessing the device.

So I retract my previous thoughts on my initial response...I still consider this hacking, but you are obviously limited on what you can do, based on RAW.
Wasabi
Excellent perspectives... thanks everyone!
otakusensei
...


Holy crap... do we have a consensus?
Wasabi
Sssshh, otakusensei... you'll jinx it!!!!

:-)
Blade
QUOTE (deek)
Looking at page 225 (Intercepting Wireless Signals), I think gives me a slightly different angle than I earlier stated. And really, it comes down to defining what the OP meant by hacking.

Per RAW, you can listen in, edit, block, etc the traffic between the two devices...but, it looks like you wouldn't be able to upload an agent or access the subcription list. You could spoof the other device and if they receving node accepts the request to upload the agent, I suppose you could do that, but it wouldn't be like "Hacking on the Fly" and accessing the device.

So I retract my previous thoughts on my initial response...I still consider this hacking, but you are obviously limited on what you can do, based on RAW.

Yes that's why you can do with the wireless signals.

But nothing prevents you from connecting your commlink to one of the other commlink in range of both signals. Then it's standard hacking : discover the node, connect to it, decrypt, exploit and you're in.

If you've got only one guy with a commlink with no connection to the Matrix but with his wireless emitter still on, you can still connect to his commlink, right? Adding another commlink and a connection between the two don't change anything about it.
mfb
one point worth noting is that, at least as far as i can tell, if your node's wireless capabilities are not actually turned off, and you're in range of a node with a Matrix connection, you are connected to the Matrix whether you like it or not. you can't unsubscribe from the Matrix.
The Jopp
QUOTE (mfb)
one point worth noting is that, at least as far as i can tell, if your node's wireless capabilities are not actually turned off, and you're in range of a node with a Matrix connection, you are connected to the Matrix whether you like it or not. you can't unsubscribe from the Matrix.

Well, yes they can. They can choose not to connect to the Node.

You dont connect to the matrix automatically, you must connect to a node that in turn is conencted to the matrix.

So, you can have your Wi/Fi on and NOT be on the matrix.

bait
QUOTE
If you've got only one guy with a commlink with no connection to the Matrix but with his wireless emitter still on, you can still connect to his commlink, right?


As long as the commlink your trying to is set to accept connections, if its run in hidden mode its set to only accept a specific set of connections. ( This is where wireless intercepts are handy as you can potentially ease drop on subscriptions on the air.)
Blade
I guess that connecting even if your connection is not supposed to be accepted is all part of the high treshold for finding the hidden node and also part of the exploit process (which, according to the FAQ includes the subscription to the node).
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012