QUOTE (TheOOB @ Dec 12 2008, 09:26 PM)
Exploit, Stealth, Spoof, Decrypt, Command, Edit, Sniffer, the usual. Hacking into a car is no different then hacking into any other node, they typically have a decent firewall and encrypted connections, but once you have admin access you can do pretty much whatever you want.
Ok, this subject interest me as well, as I normally play Mages, but i'm now looking at a hacker,
so just goi9ng through how you would do a hack of a car...
1:Sniffer, to find the signal of the cars comm; Electronic Warfare + Sniffer(3). (Intercepting wireless signals, BBB225)
2: Exploit to get control, pref at +6 threshold for admin access; Hacking + Exploit (Firewall, 1 IP) ; +6 for admin account. (hacking on the fly, BBB221)
3: Stealth running to make step 2 less likely to set off all of the alarms, etc. Each attempt can be noticed by a Ablayse + Firewall (Stealth) test. (hacking on the fly, BBB221)
4: Command to tell the car what to do once you have the admin account of the car. (Issuing Commands, BBB221)
alternatively,
1: Sniffer to listen to the owners comm send info to the car (same as above)
2: decrypt the traffic between the car so you can then spoof commands. Decrypt + Response (Encryption rating x 2, 1 combat turn). (Encryption and Decryption, BBB225)
3: spoof a command to it, such as set a destination for its pilot to drive to, so you cna then work on it with the previous steps. Hacking + Spoof vs Pilot + Firewall (Spoof command, BBB224)
Is this how hacking works?
As I said, have never used it, but looking into it, so had better work out how the rules work.