Help - Search - Members - Calendar
Full Version: Hacking question from Gencon
Dumpshock Forums > Discussion > Shadowrun
artent
I'm a bit hazy on the details of how hacking works, so here is an example of how we ran the rules at one of the games in Gencon, please help me understand by explaining what we did wrong.

The set up:
There is a building with Cameras, a distress button and some data.

Objective: Disable the distress button, copy and erase the data, disable some of the cameras.

What we did: The hacker got within cable range of a lock and hacked it directly using Hack on the fly. As per the example on pg. 224. He easily got a few marks on the lock and thus the Host for the building. Next he used an Enter Host action to get into the building. This is where we get a bit confused.

Next he rolled Matrix Perception to find the distress button device(did he have to do this, what was his threshold?). Next he used Spoof Command to disable the alarm.(At this point we realized that he had almost no chance of success on this if the device was defending with the hosts stats, this didn't feel right so we figured once you get into the Host you are past the Hosts external defenses and you roll against the device itself)
We followed the same procedure to manipulate the the cameras.

I'm not sure what rating the Host was but I think 5-6. Had our Decker been forced to roll an opposed test against the Host we could not have done this run, period.
shinryu
QUOTE (artent @ Aug 20 2013, 10:27 PM) *
I'm a bit hazy on the details of how hacking works, so here is an example of how we ran the rules at one of the games in Gencon, please help me understand by explaining what we did wrong.

The set up:
There is a building with Cameras, a distress button and some data.

Objective: Disable the distress button, copy and erase the data, disable some of the cameras.

What we did: The hacker got within cable range of a lock and hacked it directly using Hack on the fly. As per the example on pg. 224. He easily got a few marks on the lock and thus the Host for the building. Next he used an Enter Host action to get into the building. This is where we get a bit confused.

Next he rolled Matrix Perception to find the distress button device(did he have to do this, what was his threshold?). Next he used Spoof Command to disable the alarm.(At this point we realized that he had almost no chance of success on this if the device was defending with the hosts stats, this didn't feel right so we figured once you get into the Host you are past the Hosts external defenses and you roll against the device itself)
We followed the same procedure to manipulate the the cameras.

I'm not sure what rating the Host was but I think 5-6. Had our Decker been forced to roll an opposed test against the Host we could not have done this run, period.


in my opinion, nope. patrol IC should have been up his ass like a motherfucker, and anything that he isn't directly connected to should be defending with the host's stats. he could have run wrapper to look like another device, but even then the patrol IC should have tried to suss him out after a door lock made a request to disable the panic button. probably not a usual operating procedure there.
Catadmin
Were you playing in one of the official CGL Shadowrun games or was this a mission created by a non-affiliated person?

If the former, do you remember the name of the mission? I can check with the Missions line dev and author to figure out if what you did was a statted encounter or if it was a piece of flavor action, which does make a difference in whether what you did should work or not (GM discretion you know @=).

But to try and answer the question, the threshold to notice the alarm depends on whether or not it is hidden and / or protected by the host at all. (Which is one of the reasons I want to check the adventure for the details). Per page 241, the alarm would probably be either a 3 (limited interest or not publicized) or 6 (hidden) threshold to find with a -2 dice pool modifier for obscurity. At least, that's the way I would run it.

On the other hand, on page 235 the rules state "You can automatically spot the icons of devices that are not running silent within 100 meters of your physical location". Again, I'd want to see what the mission stated for this bit of scene before I said that he could easily find a distress button.

On the other hand, if the GM had no problem letting the decker do the deed, then it's his/her discretion and yay for the decker.
HugeC
From page 233: "If you are in a host that has a WAN, you are considered directly connected to all devices in the WAN."

So once you are in a host, you can hack any devices slaved to it, and they don't get the host's Matrix attributes on defense. Sounds like you guys handled it right to me.
DeathStrobe
QUOTE (HugeC @ Aug 20 2013, 06:16 PM) *
From page 233: "If you are in a host that has a WAN, you are considered directly connected to all devices in the WAN."

So once you are in a host, you can hack any devices slaved to it, and they don't get the host's Matrix attributes on defense. Sounds like you guys handled it right to me.

That's what I was thinking too. This also make some sense as Hosts have pretty damn good stats, so having a few security vulnerabilities with hardlines would make sense to me.
BlackJaw
It looks like you did alright, although it would be easier for us to give feedback if you could recall more details about the run.

QUOTE (artent @ Aug 20 2013, 02:27 PM) *
The hacker got within cable range of a lock and hacked it directly using Hack on the fly. As per the example on pg. 224. He easily got a few marks on the lock and thus the Host for the building. Next he used an Enter Host action to get into the building.
This sounds more or less right, although in most cases a lock on a reasonably secure facility isn't going to have easy access to it's universal data port. You'd probably need to make a Lockpick check to open the casing to gain access to a port, as noted on Page 363: "The first step to bypassing a maglock is to remove the case and access the maglock’s electronic guts." In really secure facilities they may also have tamper sensors, so it would require two checks to open it without setting off an alert.

QUOTE
Next he rolled Matrix Perception to find the distress button device(did he have to do this, what was his threshold?).
Matrix Perception is what you use to locate icons inside a host. Matrix Search is used to locate data, but this is a device icon, not information. Hosts are virtual so the 100 meters rule may not apply, but page 241 on Matrix Perception notes: "If you’re trying to spot an icon that is farther than 100 meters away, this is a Simple Test: the first hit lets you spot the target, and any additional hits can be used to get more information about it as mentioned above." It sounds like you handled things ok if the Panic Button was running in public mode.

If it was running Private mode, things are less clear. Page 235 notes: "If you know at least one feature of an icon running silent, you can spot the icon (Running Silent, below)." My reading of that is: If you know there is a Panic Button, and your first Matrix Perception check didn't spot the icon, then you can make a check to locate the Hidden Icon directly, pitting your Computer + Intuition [Data Processing] vs it's Logic + Sleaze. Another interpretation is that you would need to make a Matrix Perception test, or spend a hit from a previous test, to determine the number of Running Silent Icons in the Host, and then randomly pick them and attempt to spot them until you found the one you wanted. Personally, that sound rather boring.

QUOTE
Next he used Spoof Command to disable the alarm.
This might be wrong. To spoof a device you need to have a mark on on it's owner's Icon. page 242 "You spoof a device’s owner’s identity, making the device think that your command is a legitimate one from its owner. You need one mark on the icon you are imitating;" Although the device is slaved to the host, slaving and ownership are not the same thing, so unless your player had a mark on owner, he can't spoof. It's not entirely clear if an owner can be something other than a person (like a host) although page 237 notes a Corporation as an owner. Ownership is used for determining attributes used in defense tests, so it's important for a number of reasons actually.

QUOTE
(At this point we realized that he had almost no chance of success on this if the device was defending with the hosts stats, this didn't feel right so we figured once you get into the Host you are past the Hosts external defenses and you roll against the device itself)
QUOTE
I'm not sure what rating the Host was but I think 5-6. Had our Decker been forced to roll an opposed test against the Host we could not have done this run, period.
A rating 5 Host is applicable for "local police" and would have matrix attributes of 5/6/7/8 (Gm's choice, see page 247) so that's a tough run to go on. Those attributes would be used for the IC certainly, but as other posters have noted from page 233: "If you are in a host that has a WAN, you are considered directly connected to all devices in the WAN." It sounds like once inside the Host you'd be able to interact with devices at their standard attributes instead of at Host Enhanced ones. I guess the protection of the Host is that you have to get into it first, and that it has IC, which incidentally do use the rather high Host Matrix Attributes. As a side note: Files in a host use the Host attributes instead of their owner's for defending against the Edit File action, page 239: "The defender against this test is either the host holding the file or the owner of the file (if it’s not on a host)."

So to disable the the button, the player could have secured 3 marks on it via (possibly repeated) Hack on the Fly/Brute Force actions and then Formatted the device and forced it to Reboot (two more hacker actions). Alternatively he could have dataspiked it until it was bricked, or placed a mark on its owner and then spoof commands to it for the reboot and then reformat. Lastly, you might have allowed use of the Control Device matrix action to change it's response to being activated, but I'd have required at least 3 marks (Complex action) for that.
T2-Keks
Reading this helps me a lot to better understand the SR5 matrix stuff.

Special thanks to BlackJaw, your posts often give very detailed explanations with page references and many of your thoughts. You're a big help!
BlackJaw
QUOTE (T2-Keks @ Aug 21 2013, 03:28 AM) *
Special thanks to BlackJaw, your posts often give very detailed explanations with page references and many of your thoughts. You're a big help!
Thank you. I'm trying to be helpful, but I'm also doing it as part of my way of learning the new rules. I learn a lot from these boards and the discussions they bring up. I'm often wrong or otherwise learn something.

For Example: In this thread I learned that WAN rules do not provide protection to devices when dealing with hackers already inside the Host. It wasn't what I thought when I read the thread, but the rules reference HugeC dug up indicates otherwise. I dug through the book looking at all the WAN and Host rules I could find, and looking at the example text (sadly low on details) and was unable to find any other part of the book that said Hosts provide their matrix attributes to the devices inside. Instead the book talks about hosts as akin to building a house and placing the valuables inside. Page 359: "Creating a Host is akin to constructing a building and putting important things inside."

Overall this interpretation of the WAN rules encourages onsite hacking (getting the decker out of the Van). If you can gain a direct line access to part of the WAN, you can gain entrance to the Host, and once inside hack the various devices as if direct connected, etc. If the Host provides it's attributes to all the devices inside it, more similar to PAN, then you'd have to be skilled enough to hack each device as if it was the Host itself, and in that case (if you're that good) you might as well have just hacked host directly through the matrix instead of risking being shot on an onsite hack.
HugeC
I'm the same as Blackjaw, just trying to learn the rules by talking to you guys! I have never really understood the Matrix, but if I want to run a game, I need to know it. There are still plenty of things (like Ownership) that make no sense to me.
Jack VII
QUOTE (HugeC @ Aug 21 2013, 09:37 AM) *
I'm the same as Blackjaw, just trying to learn the rules by talking to you guys! I have never really understood the Matrix, but if I want to run a game, I need to know it. There are still plenty of things (like Ownership) that make no sense to me.

I'm also pretty confused about this, particularly as it relates to the Spoof command. Some examples in the book identify MegaCorpX as the owner of a device. How does one place a mark on MegaCorpX in order to accomplish the Spoof comand? It seems like there are supposed to be owners and delegated owners to make the rules work.
Redjack
QUOTE (BlackJaw @ Aug 20 2013, 11:29 PM) *
This sounds more or less right, although in most cases a lock on a reasonably secure facility isn't going to have easy access to it's universal data port. You'd probably need to make a Lockpick check to open the casing to gain access to a port, as noted on Page 363: "The first step to bypassing a maglock is to remove the case and access the maglock’s electronic guts." In really secure facilities they may also have tamper sensors, so it would require two checks to open it without setting off an alert.
The pad was not wireless. A wire ran from the pad to the ground, then underground to the facility. The hacker peeled back the cover and used a datatap, bypassing tamper detection on the case. Multiple cameras were watching the pad but from the back, facing the user, not the pad.,Also, the team followed a security guard going off shift to his favorite watering hole, sent team members in disguise to get good audio and video of him, then used disguise (Pre-spend edge: 8 hits) to look like the guard. The team mage was sustaining levitiate on the decker, so when he went full VR, she held him off the ground. Of course, the onsite security got suspicious, him returning to work and all, but the team owned his comlink back at the bar and carried on a conversation long enough for the decker to get to the host.

QUOTE (BlackJaw @ Aug 20 2013, 11:29 PM) *
Matrix Perception is what you use to locate icons inside a host. Matrix Search is used to locate data, but this is a device icon, not information. Hosts are virtual so the 100 meters rule may not apply, but page 241 on Matrix Perception notes: "If you’re trying to spot an icon that is farther than 100 meters away, this is a Simple Test: the first hit lets you spot the target, and any additional hits can be used to get more information about it as mentioned above." It sounds like you handled things ok if the Panic Button was running in public mode.
The panic button was also wireless, but by this time, the decker was in the host and by virtue of his connection, both technomancers as well.

QUOTE (BlackJaw @ Aug 20 2013, 11:29 PM) *
If it was running Private mode, things are less clear. Page 235 notes: "If you know at least one feature of an icon running silent, you can spot the icon (Running Silent, below)." My reading of that is: If you know there is a Panic Button, and your first Matrix Perception check didn't spot the icon, then you can make a check to locate the Hidden Icon directly, pitting your Computer + Intuition [Data Processing] vs it's Logic + Sleaze. Another interpretation is that you would need to make a Matrix Perception test, or spend a hit from a previous test, to determine the number of Running Silent Icons in the Host, and then randomly pick them and attempt to spot them until you found the one you wanted. Personally, that sound rather boring.
Running silent is broken unless a lot of stuff is running silent.

QUOTE (BlackJaw @ Aug 20 2013, 11:29 PM) *
This might be wrong. To spoof a device you need to have a mark on on it's owner's Icon. page 242 "You spoof a device’s owner’s identity, making the device think that your command is a legitimate one from its owner. You need one mark on the icon you are imitating;" Although the device is slaved to the host, slaving and ownership are not the same thing, so unless your player had a mark on owner, he can't spoof. It's not entirely clear if an owner can be something other than a person (like a host) although page 237 notes a Corporation as an owner. Ownership is used for determining attributes used in defense tests, so it's important for a number of reasons actually.
QUOTE (BlackJaw @ Aug 20 2013, 11:29 PM) *
It sounds like once inside the Host you'd be able to interact with devices at their standard attributes instead of at Host Enhanced ones. I guess the protection of the Host is that you have to get into it first, and that it has IC, which incidentally do use the rather high Host Matrix Attributes. As a side note: Files in a host use the Host attributes instead of their owner's for defending against the Edit File action, page 239: "The defender against this test is either the host holding the file or the owner of the file (if it’s not on a host)."
He got marks on the host by getting marks on the pad. From there, spoofing commands to other slaved devices was a walk in the park.

The undoing of the team were actually two things. First, other security measures that I'll leave unknown so as not to spoil the run for others and second... Never forget EVERYONE also has a personal comlink.
Redjack
QUOTE (Jack VII @ Aug 21 2013, 10:15 AM) *
I'm also pretty confused about this, particularly as it relates to the Spoof command. Some examples in the book identify MegaCorpX as the owner of a device. How does one place a mark on MegaCorpX in order to accomplish the Spoof command? It seems like there are supposed to be owners and delegated owners to make the rules work.
I think Ownership is a poorly thought out mechanic to deal with players who "dungeon crawl for loot" rather than play Shadowrun. Easier solutions to the root problem include notoriety, public awareness, burned contacts & police investigations.

Edit: As well as the enemies quality. Just because there is no rules for adding it for karma, does not mean a GM cannot assign it for having your stuff stolen, your brother's body parted out, etc.
Also, I had a player who was abusing the connection rating rules. He was using a rating 1 contact (Virtually no social influence; useful only for their Knowledge skills, SR5, pg387) to fence parted out cyber ware. A GM simply pushing back on nonsense like that can deal with the issue better than the ownership mechanic.
Goonshine
QUOTE (Jack VII @ Aug 22 2013, 12:15 AM) *
I'm also pretty confused about this, particularly as it relates to the Spoof command. Some examples in the book identify MegaCorpX as the owner of a device. How does one place a mark on MegaCorpX in order to accomplish the Spoof comand? It seems like there are supposed to be owners and delegated owners to make the rules work.


So in the corporate world right now we have systems to allow for very granular and decentralized user control, solutions like Active Directory. Usernames, policy groups, all adminstrative rights can be managed through these systems. You want to keep basic users from messing up their computers or the system, so you give them very little control. Next you have user admins, who belong to a group who can mess with a user's computer for troubleshooting, and might have access to networking or security areas as part of their work as well. On top of them all, you have the networking and security admins, who have total access to their own systems.

It would be totally infeasible for a security device to only have one user as the owner of a device. What if he decides to quit? Nobody can reboot that door until you mess with the settings! No, you would have a group of people with access, and the point would be to either get some marks on one of the members of that group, or get some marks on the server/device/host/whatever that handles all those security permissions.

Fun fact: a lot of upper management will press for admin rights to everything in the system just because they are upper management, and despite it being a huge security liability sometimes departments will be forced into going along with it. Instead of trying to break into the system and put your marks there against the trained veterans, why not just run into a junior VP at a bar, slip something into his drink, and peel his commlink away for a few minutes? Just a thought.
Jack VII
^ That's a very SR4 approach with the different levels of authority. I think it made the system a bit more robust in dealing with issues like this, but could get wildly confusing.

Just my view, but it seems like there is a relation between, for instance, a corpsec guard and their smartgun that allows them to give the gun commands (eject clips through DNI) but not actually give "ownership" of the gun to the guard. I would think the spoof command would allow you to mimic that particular relationship by getting a mark on the guard's smartlink/commlink/datajack however they have their PAN set up. As written, the guard probably isn't the device's "owner" so the Spoof Command, as written, wouldn't work (unless they are carelessly using the term owner in the program description).
shinryu
yep, good old social engineering at work, there.

i am a little surprised that devices in a host don't get the host's defenses once penetrated, but the thing to remember even then is that any reasonable host will be running patrol IC looking for unauthorized users all the time. so it's still risky to hang out in a host for any length of time.
Jaid
QUOTE (shinryu @ Aug 21 2013, 11:42 AM) *
yep, good old social engineering at work, there.

i am a little surprised that devices in a host don't get the host's defenses once penetrated, but the thing to remember even then is that any reasonable host will be running patrol IC looking for unauthorized users all the time. so it's still risky to hang out in a host for any length of time.


particularly since IC can be infinitely spawned and can be extremely nasty to go up against even if there's only one...
DeathStrobe
QUOTE (Jack VII @ Aug 21 2013, 10:15 AM) *
^ That's a very SR4 approach with the different levels of authority. I think it made the system a bit more robust in dealing with issues like this, but could get wildly confusing.

Just my view, but it seems like there is a relation between, for instance, a corpsec guard and their smartgun that allows them to give the gun commands (eject clips through DNI) but not actually give "ownership" of the gun to the guard. I would think the spoof command would allow you to mimic that particular relationship by getting a mark on the guard's smartlink/commlink/datajack however they have their PAN set up. As written, the guard probably isn't the device's "owner" so the Spoof Command, as written, wouldn't work (unless they are carelessly using the term owner in the program description).

I think that makes sense. The Corp will probably offer that Corpsec guard a 3 or 2 mark invite to the gun. So if the hacker gets one mark the Corpsec's commlink/persona, they'll have access to spoof up to the limit of marks the corpsec guard has.

If it does work that way, it'd be hilarious to unwittingly mark another hacker hacking a host only for that hacker to be discovered and blowing your cover at the same time.
xsansara
But that also explains why there are no centralized companies offering WAN for hire. The second anyone touches your customer's device to hack-with-cable, they'd have access to your inner sanctum AND to all your other customers, if only for a second, until your IC fries them.

It also explains why there are so many physical hosts out there on location. The current trend is for companies to have large virtual server farms and then distribute to the various outposts. The SR5 hacking paradigm requires hosts to be completely independant of each other.

I wonder how they work together on a con scale. Fearing an actual data connection to avoid a breach in their compartementalized IT structure, there is probably a lot of couriering and not-sharing-the-information going on. Which is very 80's smile.gif
Sendaz
Think they will also bring back the vanishing nodes where they only appear for brief periods to shoot a fast stream of data out and take in same before disappearing again.
BlackJaw
QUOTE (Redjack @ Aug 21 2013, 08:19 AM) *
He got marks on the host by getting marks on the pad. From there, spoofing commands to other slaved devices was a walk in the park.


Someone else recently pointed out this bit of text from the book:
QUOTE (GODs and Spiders, Page 360)
Since spiders are considered the owners or administrators of a system, they can command any of the devices in that system without having to gain any marks, since they already have the owner mark for all devices. They have the authority to launch or shut down IC, raise or cancel alarms, or even perform an emergency shutdown of the entire system.

It looks to me that in order to spoof things inside a Host, you'd need to have a mark on the Spider, not the host.
DMiller
QUOTE (BlackJaw @ Aug 29 2013, 12:31 AM) *
Someone else recently pointed out this bit of text from the book:

It looks to me that in order to spoof things inside a Host, you'd need to have a mark on the Spider, not the host.

Since a Spider is not a device or a host, you can not mark it, therefore you can not spoof any attended devices or unattended devices that are slaved to an attended device because you would have to mark the non-matrix entity that is the owner.

So they need to remove the Spoof command during the Errata of SR5.

Or adjust that the mark needs to be on the Master rather than the Owner... This seems to be the better solution.
Jack VII
QUOTE (DMiller @ Aug 28 2013, 09:16 PM) *
Since a Spider is not a device or a host, you can not mark it.
A spider is usually a persona, which can be marked.
DMiller
QUOTE (Jack VII @ Aug 29 2013, 11:20 AM) *
A spider is usually a persona, which can be marked.

If he's not on-line, but still the owner?
Jaid
yeah, having a person as the owner doesn't work unless you assume that everything is equipped with unbeatable DNA testing devices or something like that.

it kinda has to be a device. that device is probably whatever the person typically uses to access the matrix, which for most people will be their commlink (but for deckers, especially ones designated to be owners on behalf of the corporation, probably their cyberdeck or terminal).

that said, renting out a host to a variety of people would still be a tremendous problem, because if any one of them has a low rating device accessible for a direct connection, you can get a mark on the device, which gets one on the host, which gets you into the host, which gets you direct access to every other device on the host (not being able to use your mark on the host to spoof every device is a slight improvement, but the fact that having even one unsecured device can leave every other device exposed is a compelling argument to not rent out parts of a host.
BlackJaw
QUOTE (DMiller @ Aug 28 2013, 07:05 PM) *
If he's not on-line, but still the owner?

Sure, why not? If I log off the matrix to go to sleep, why wouldn't I still be the owner all my stuff? The game does specify that icons/devices can only have one owner and that changing ownership is a slightly complicated affair that takes a minute to re-register devices with various grids. I don't see that being something I need to do for all my files and devices every time I log off the matrix or reboot my commlink/deck.

Spoofing is a powerful hacking option, but it's limited by requiring a mark on the owning icon. If something is owned by a person, that means their Persona, and they only have a persona if they are actively using the matrix in AR or VR. The rest of the time you can't spoof their devices. Spoofing, much like getting a file out a host archive, may require waiting for the right moment or using a little social engineering.

Don't confuse ownership with slaving. A device might be slaved to a commlink or a host, but that doesn't mean the commlink or host is the owner. An device can have a master and an owner that aren't the same icon. Spoofing requires a mark on the owner, not the master.

EDIT: Setting a Host as owner is actually a bad idea. Anyone that has hacked access into the host would have at least one mark on the host to do so, which means they would be able to spoof any device "owned" by the host. It's far safer to have the Spider as owner, so even if someone hacks their way into a the host, they still need to locate and mark the persona of the spider, if they happen to be online, in order to spoof devices. Note that page 360 specifically says that Spiders in a host are considered the owner of the devices and host. This may be an exception to the general rules about icons having a only a single owner. It's a special relationship.
DMiller
Wouldn't it be better to set someone that rarely (if ever) gets onto the Matrix (or at least uses a particular device to get on the Matrix) as the owner then? That way your equipment would be nearly un-spoofable, as the only time you could spoof the equipment is when lab-project xyz is actually on-line (assuming lab-projexc xyz is set to be the owner).
Epicedion
Spoof Command isn't written all that well, but then again it's written sufficiently:

QUOTE
You spoof a device’s owner’s identity, making the
device think that your command is a legitimate one from
its owner. You need one mark on the icon you are imitating;
you do not need a mark on the target. The opposing
dice roll is still based on the target, though. This trick
only works on devices and agents, not IC, sprites, hosts,
personas, or any other icons.


That line about "spoof a device owner's identity" is confusing, but it's not a mechanic. By the bolded section, which is a mechanic, you only need a mark on the icon you're imitating. Not the owner. So if JoeBob has rights to connect to the Smartlink, you should be able to spoof his Smartgun if you have a mark on his commlink.

Now if you want to look at some sort of tree, it would look like this:

Owner
|
|
Master Commlink / Cyberdeck / Host
|
|
Authorized User Commlink
|
|
Spoofable Device

Essentially if you get a mark on anything above the device in that tree, you should be able to spoof the device. Each is associated with an identity that the device is programmed to accept commands from.
DMiller
Thanks Epicedion, that makes a lot more sense now.
Tymeaus Jalynsfein
QUOTE (BlackJaw @ Aug 28 2013, 09:13 PM) *
Sure, why not? If I log off the matrix to go to sleep, why wouldn't I still be the owner all my stuff? The game does specify that icons/devices can only have one owner and that changing ownership is a slightly complicated affair that takes a minute to re-register devices with various grids. I don't see that being something I need to do for all my files and devices every time I log off the matrix or reboot my commlink/deck.

Spoofing is a powerful hacking option, but it's limited by requiring a mark on the owning icon. If something is owned by a person, that means their Persona, and they only have a persona if they are actively using the matrix in AR or VR. The rest of the time you can't spoof their devices. Spoofing, much like getting a file out a host archive, may require waiting for the right moment or using a little social engineering.

Don't confuse ownership with slaving. A device might be slaved to a commlink or a host, but that doesn't mean the commlink or host is the owner. An device can have a master and an owner that aren't the same icon. Spoofing requires a mark on the owner, not the master.

EDIT: Setting a Host as owner is actually a bad idea. Anyone that has hacked access into the host would have at least one mark on the host to do so, which means they would be able to spoof any device "owned" by the host. It's far safer to have the Spider as owner, so even if someone hacks their way into a the host, they still need to locate and mark the persona of the spider, if they happen to be online, in order to spoof devices. Note that page 360 specifically says that Spiders in a host are considered the owner of the devices and host. This may be an exception to the general rules about icons having a only a single owner. It's a special relationship.


See... I see Ownership as a Hardware thing, not a software or Persona thing. Otherwise Spoofing does not work, ever.

EDIT: Awesome Example Epicedion...
BlackJaw
QUOTE (Epicedion @ Aug 28 2013, 10:44 PM) *
That line about "spoof a device owner's identity" is confusing, but it's not a mechanic. By the bolded section, which is a mechanic, you only need a mark on the icon you're imitating.

How is the second line a mechanic but the first one isn't? Ownership is a mechanic defined on page 236, so we can't ignore the first line. "This is a special relationship that offers special privileges. Each Matrix object can only have one owner, but you can own as many Matrix objects as you like. " An owner is often a person and as we know from page 218: "A persona is more or less what it sounds like: a person in the Matrix. " The Spoof action clearly states it is used to mimic ownership, and to do so you need to have a mark on the icon you (owner) you're mimicking. If you want to spoof a device, you have to have a mark on its owner, and if its owner is a person, then their icon is a Persona.
If it's owner is corporation, as implied by the security guard's gun on page 237, then we have to look at page 360: "Since spiders are considered the owners or administrators of a system, they can command any of the devices in that system without having to gain any marks, since they already have the owner mark for all devices." The Spider is still a person with a persona.

QUOTE (Epicedion @ Aug 28 2013, 10:44 PM) *
So if JoeBob has rights to connect to the Smartlink, you should be able to spoof his Smartgun if you have a mark on his commlink.

Now if you want to look at some sort of tree, it would look like this:

Owner
|
|
Master Commlink / Cyberdeck / Host
|
|
Authorized User Commlink
|
|
Spoofable Device

Essentially if you get a mark on anything above the device in that tree, you should be able to spoof the device. Each is associated with an identity that the device is programmed to accept commands from.

I'm not sure where you got the concept of devices or icons being in trees in 5th edition from. The only thing even remotely like that in the book is the Master/Slave relationship of a PANs and WANs and that doesn't build into trees, at least according to anything I see on page 233. It actually calls the master-slave setup "that particular relationship" which implies it doesn't alter any other relationships beyond the master and slave link. Nor do I see anything in the book about it altering or counting as ownership, or that Owners even have to be part of the PAN. A technomancer, who can not slave devices to his living persona, certainly isn't connected to a PAN, but can still have his devices slaved to a commlink for their protection.

It looks to me like a device that has it's wireless on is simply on the matrix and is connected to anything else that is one the matrix. The only exception are Hosts, which are described as being like houses with icons protected inside them. The rules for hosts say on page 246 "When you’re outside of a host, you can’t interact directly with icons inside it," so spiders/owners aren't sending commands through a host to the devices inside, but instead are actually in the host and interacting with the various device icons directly. I personally don't see anything backing up a tree diagram.

By your interpretation, a mark on the host is good enough to spoof everything inside the host. I think that's way too broad use, as anyone that has hacked into a host has to have one mark on it already, and that would allow them to spoof 3 mark invites from any device or agent inside the host.... without having even seen the spider "owner" of the host.
Tymeaus Jalynsfein
QUOTE (BlackJaw @ Aug 29 2013, 07:35 AM) *
By your interpretation, a mark on the host is good enough to spoof everything inside the host. I think that's way too broad use, as anyone that has hacked into a host has to have one mark on it already, and that would allow them to spoof 3 mark invites from any device or agent inside the host.... without having even seen the spider "owner" of the host.


But the Spider is not the "Owner" of the Host, he just has permissions to use/protect the host (and thus has 3 marks).
BlackJaw
QUOTE (Tymeaus Jalynsfein @ Aug 29 2013, 07:39 AM) *
But the Spider is not the "Owner" of the Host, he just has permissions to use/protect the host (and thus has 3 marks).

Page 360: "Since spiders are considered the owners or administrators of a system, they can command any of the devices in that system without having to gain any marks, since they already have the owner mark for all devices. "
They are considered the owner. Mark them and you have a mark on the owner. They even have the "ownership mark" which counts as 4 not, 3. page 236: "For all intents and purposes, owning an icon is the same as having four marks on it." This is probably an example of a specific rule overriding a general rule. Spiders in "their" host are considered the owner of that host, and thus the owner of the devices in the host.

Spoofing in a host just means getting a mark on the spider first.

QUOTE (Tymeaus Jalynsfein @ Aug 29 2013, 07:22 AM) *
See... I see Ownership as a Hardware thing, not a software or Persona thing. Otherwise Spoofing does not work, ever.

It's a registration thing, less a hardware thing: Page 236: "Ownership, at least in the Matrix, is something that is registered with both the device (or other icons) and the grids, so it’s a bit more involved than just putting a “Property of [blank]” sticker on it. " Page 237: "The owner of an icon can intentionally transfer ownership to another persona in a process that takes about a minute." The rules for forcibly changing ownership of a device (IE: Stealing) does involve opening it up and messing with the hardware, but I get the feeling that's more like altering the VIN number so it no longer matches the ones registered on the grids. It isn't clear, but the implication is it's more than just altering the name inside the device because ownership involves the grids/etc.

Also, ownership probably is a persona thing. Ownership counts as having 4 marks (page 236), and only Personas can place marks, page 236: "Only personas may mark icons."

In the Host example, if the Spider is in the host, he has a persona. Mark him, and you can spoof everything in the host. If you need to make him show up, cause a little problem, and he'll coming running. Tehcnomancers could make excellent use of sprites for this purpose, but a Decker with an Agent would work just as well. Hell, just kill the Patrol IC without getting spotted, and the spider will show up to see what's going on. If you made the first strike, it may take him a moment to figure out what's going on, and that's enough time to get a mark on him.

Spoofing isn't just some alternative to Hack on the Fly or Brute Force, or even control device. It's a powerful option allowing access to various tricks. Spoofing invites can let you send invites to a persona without an OS score, or you can leave the invite open, reboot, clearing your own OS, and then accept the invites, getting "clean" ones. It might theoretically be used to end a Master/Slave setup.

Here's an example of Spoofing doing something otherwise not possible:
Let's say you're in a car chase with an armored limo: say it's an extraction gone wrong. The driver of the armored limo is probably rigged into his car (even if he isn't physically present in the car but is instead a security rigger for the corp ), so the car itself is merged with his persona (see page 241). Probably not too hard to find & mark him seeing as he is the car on the matrix. Now let's say he has a set of rotodrones/etc protecting the limo too. With just one mark on the rigger, you can spoof an "invite 3 marks with permission to rig" command at one of the defending rotodrones, only have that invitation aimed at your team's rigger instead of at you. Now your friend the shadow-rigger can hop into the enemy's rotodrone, overriding any remote control or dog brain (as jumping in is higher priority,) and use it against the other drones or the limo itself.

EDIT:
The problem we get to with ownership is how is your Persona can be unique enough for ownership no mater how you get online, yet still clean of OS every time your reboot your system. I don't have an answer for that, beyond it's just a game and it can't be too realistic or it won't play well.
Redjack
Nice summary and explanation BlackJaw.

-Thx.
DMiller
Thanks BlackJaw for the detailed explanation.

So basically any smart corporation will simply set the owner of their equipment to a persona that rarely (if ever) gets on-line once the 3-mark spider invites do out. To do anything other than this will open them up to very powerful spoofing attacks. The only time this non-online persona needs to go on-line is if new hardware is added to the system.

Sounds like the spoof command has become about as useful as... Watchers?... No watchers are still actually better. With sound security (and easy and cheap to set up security) spoof becomes a complete non-option.

Cool, I know not to worry about using spoof for anything now.
Redjack
QUOTE (DMiller @ Aug 29 2013, 06:33 PM) *
So basically any smart corporation will simply set the owner of their equipment to a persona that rarely (if ever) gets on-line once the 3-mark spider invites do out.
Corporations are (1) about making money and (2) operations almost always trumps security, so I would say for most corporations that is not something they would consider; also it wouldn't be much fun for the players if they could never track down the 'owners'.

Edit: Also, since everyone is always online, especially corporate wage-slaves....
DMiller
The only actions that require Owner are: Change Ownership, Change Icon, Full Matrix Defense, Invite Mark, Jack Out, Jam Signals and Switch Interface Mode. Setting the owner to a mostly non-matrix entity (someone who for whatever reason stays off of the matrix except to do one of the above actions) is not only smart, but in-expensive for the corporation and after sending the mark invites out for the spiders (and any new hardware/users) the owner should go off-line and stay that way. Maybe coming on-line on a semi-regular interval to do invite updates.

This setup would not cost a corporation any extra money, and would not normally interfere with operations. The only odd part of the setup is the "normally off-line" person, but that can be easy enough to do.

Our group tends to try to set up semi-realistic security and make the group figure out how to get past it. To me this seems like a very good and not expensive at all security measure. Will every corp do this? Probably not, but most should as it is cheap and prevents one of the biggest security problems in the Matrix.

Of course I'm not the GM for our current game, so I'm not sure how the GM will handle it. I play the main Decker for the group and I'm not planning to do much spoofing at this time due to the messed up way that spoofing (doesn't) work. If the GM is feeling leinent and wants Spoofing to be viable, I'll work with ti, until we figure that out I'll count on not spoofing anything.
BlackJaw
QUOTE (DMiller @ Aug 29 2013, 08:43 PM) *
The only actions that require Owner are: Change Ownership, Change Icon, Full Matrix Defense, Invite Mark, Jack Out, Jam Signals and Switch Interface Mode. Setting the owner to a mostly non-matrix entity (someone who for whatever reason stays off of the matrix except to do one of the above actions) is not only smart, but in-expensive for the corporation and after sending the mark invites out for the spiders (and any new hardware/users) the owner should go off-line and stay that way. Maybe coming on-line on a semi-regular interval to do invite updates.

I half agree: Having a spider in the host at all times may be a bit of a vulnerability that a paranoid corp would avoid. If a hacker manages to hack into the host without setting off an alarm, and then marks the spider without alerting the spider, and then spoofs a device without alerting the device: he can pull off some potent hacks. For that reason, you might assume that Spiders are only in the Host when they need to be, but I would still call in a spider if an alarm gets raised. My reasoning is that IC is really limited so you want a spider to show up and aid in the defense of a host should an alarm get raised.

Generally only Patrol IC is running in a Host. If the host/IC detects anything, or if the spider chooses to launch IC for any reason, one new bit of IC can be loaded every combat round up to the host's rating. Only one version of each kind of IC can be loaded at a time... so never more than one Patrol IC, for example. Each IC has only one function it can perform and most focus on locating, marking, degrading, link locking, or tracking an Hacker. None of them can take other actions, like Erase Mark, nor can they adapt. You'll want a Spider present to direct the response intelligently, erase hacked marks the hacker has or is placing on things, and shut down inappropriate IC to load in ones better focused on the situation. Spiders can also do an emergency shutdown of the entire system if they think it's the only way to stop a hacker form getting a particular bit of pay data or performing some other terrible hacker activity. Of course disconnecting the entire building's systems, security or otherwise, and possibly dumpshocking everyone in the host (I'm not sure what happens if a host shut downs with personas inside) is an extreme reaction, but a plausible one for some situations.

Moreover: A Host and it's IC share spotting info and Marks, which means a skilled hacker, or better yet small team of hackers, can easily overwhelm IC. All you need to do is have someone (maybe a sprite or agent, maybe you if you have enough passes in VR) kill the Patrol IC before it spots you, and then kill it again every time the Host reloads it. None of the other IC can make a matrix perception check, and so will be unable to locate you if you are running silent. Simply focus on using Attack based hack actions, so you don't get marked or spotted on a failed roll, and you can get whatever you want. A spider showing up, however, throws that plan out the window. Spiders can do their own spotting, marking, attacking, etc... and they can do it from their own Silent Running Persona, making it trouble to locate them for spoofing. They can also load IC (see page 360) themselves.

As I see it, not having a spider makes a host easier to hack, not harder. Of course, your group can play however you think makes sense.
DMiller
I agree that a Host needs a spider, but I don't think the spider should be the owner (for safety reasons). The spider can do everything you listed without being the owner of the host. I would also think that most hosts would have more than one spider available, maybe not on-line all at once, but available.
Epicedion
QUOTE (BlackJaw @ Aug 29 2013, 10:35 AM) *
I'm not sure where you got the concept of devices or icons being in trees in 5th edition from.


It's not a mechanic, it's a description of a mechanic. If you'd prefer it another way:

Attempt spoof, command X.

Do you have a mark on a device/persona/etc that can run command X on the target?

If yes, roll.

If no, screw you, hippie.
Tymeaus Jalynsfein
QUOTE (Epicedion @ Sep 2 2013, 10:41 PM) *
It's not a mechanic, it's a description of a mechanic. If you'd prefer it another way:

Attempt spoof, command X.

Do you have a mark on a device/persona/etc that can run command X on the target?

If yes, roll.

If no, screw you, hippie.


Succinct and to the point. wobble.gif
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012