Help - Search - Members - Calendar
Full Version: Hacker walkthrough
Dumpshock Forums > Discussion > Shadowrun
James McMurray
Is there a simplified walkthrough of a hack on a node? The runner's toolkit has an entire run walkthrough, but their hacker is a technomancer and I'm just wanting to learn the basic stuff.
Fatum
Yes. Hacking subchapter in the Wireless World chapter, Core Rulebook.
sabs
I can give you a basic walkthrough for Hacking a Node:
Assuming no Data Bombs everywhere.

If Node is Hidden:
Electronic Warfare + Scan threshold (4, complex action), unless you're doing a general scan, in which case it's (15, combat turn)

You have now found the Node:
1) Computer+Analyze, each hit gives you a piece of information: System Rating, Firewall Rating, Response, Encrypted (y/n), Data Bomb on Gateway (y/n), IC watching Node gateway
2a) slow probe: Hacking+exploit (system+firewall+level of access modifier, 1 hour)
2b) Hacking on the Fly: Hacking+exploit(system+firewall+level of access modifier, complex action), vs System+firewall(Your Stealth Rating, complex action)
3) Log in: System+firewall(stealth rating), Any IC does Agent+Analyze(stealth rating)
4) Computer+Analyze, each hit gives you information on the system, including # of icons subscribed, gateways to other nodes, etc.
5) datasearch+browse
6) EC+decrypt(Encryption Rating, combat turn)
7) Do what you came here to do
8) computer+edit to modify logs
9) log out
James McMurray
Thanks!
Wolfgar
Hey, thanks for the list, but what's step 5 for? Is it to single out a specific icon you're looking for?
Tyro
Well put.
sabs
single icon, file, pay data, what ever.
capt.pantsless
QUOTE (Wolfgar @ May 26 2011, 01:08 PM) *
Hey, thanks for the list, but what's step 5 for? Is it to single out a specific icon you're looking for?



That way, when the Black-IC software queries you, you can say:

"Oh, sorry, I was just browsing!"


Bad humor aside, thanks for the quick writeup. Quick and complete examples is exactly the kinda thing is what they need more of in complicated, alternate-setting games like SR.
sabs
It gets way more complicated when there's sculpting, and actual descriptions, and how your Gm handles Reality filters.

It also gets more complicated once IC notice you, and you realize there's no way to turn off an alarm. smile.gif
Udoshi
Minor nitpick on sabs: You have to decrypt before you hack.

Additionally, nodes which are running stealth can be hidden themselves, requiring an analyze test to find. (the core book mentions node being able to hide with firewall+stealth)
sabs
That depends what's encrypted.
You only have to decrypt if the entire node is encrypted
WHich it isn't always.
Prime Mover
Heres a link showing rules as they interact with some fiction from sr4a.
http://forums.dumpshock.com/index.php?s=&a...st&p=804857


Aaron
And here's an audio demo some friends and I made a few years ago: http://pavao.org/aud/HackingDemo.mp3
BishopMcQ
Runner's Toolkit has a hacking scene in the Anatomy of a Shadowrun
Nath
QUOTE (sabs @ May 26 2011, 06:17 PM) *
2a) slow probe: Hacking+exploit (system+firewall+level of access modifier, 1 hour)
2b) Hacking on the Fly: Hacking+exploit(system+firewall+level of access modifier, complex action), vs System+firewall(Your Stealth Rating, complex action)
3) Log in: System+firewall(stealth rating), Any IC does Agent+Analyze(stealth rating)
Slow Probe is an Extended Test Exploit+Hacking (System+Firewall+Access level, 1 hour). When entering the node, the node gets a free Test Analyze+Firewall (Stealth).

Hacking on the Fly is an Extended Test Exploit+Hacking (System+Firewall+Access level, Complex Action). When making a test, the node gets a free Extended Test Analyze+Firewall (Stealth, hacker making a test).

When logging in, any IC can possibly spend a Simple Action to make a Matrix Perception Test. If you're running a Stealth program, that's an Opposed Test, Analyze+IC Rating versus Stealth+Hacking. With one net hit, the IC can get the programs run by your persona, and should trigger an alert if Stealth or Exploit runs.
LurkerOutThere
Also for completions sake it should be mentioned that the one hour threshhold is only relevant to probing if your in full VR. Otherwise it's one day. Otherwise bravo for the brief summary.
Falconer
Two minor nitpicks...

The threshhold is 4 to find a hidden known in a known geographic location. IE: the face sitting across from you... trying to detect if he's running a hidden wireless node on his person/pan.


The threshhold for the area version is actually 15+... a minimum of 15... depending on exactly what and how much the GM should feel free to make that number much higher. For example... if you have a signal rating 8 device... trying to catalog all devices within 10 miles, 15 more than a little low. Also never addressed is does that detect transient things... like the drone which was in the area when you started but left by the time you finished or vice versa.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012