Shadowrun: Matrix Notes: Difference between revisions

From The Whereabouts
(New page: ==Matrix General Notes== *Perception Tests: Computer + Analyze **Standard perception test difficulty threshold **If target is intentionally hiding, Opposed Test vs. (Hacking/Firewall + Ste...)
 
No edit summary
 
Line 18: Line 18:


==Security Camera Example==
==Security Camera Example==
Dmitri has some preparation time and uses the Probing the Target technique to gain admin access on the shed's security camera. This is a Hacking + Exploit Test (12, 1 hour).
Dmitri has some preparation time and uses the Probing the Target technique to gain admin access on the shed's security camera. This is a Hacking + Exploit Test (System + Firewall + Admin 12, 1 hour).


Security Camera (Response 2, Signal 3, System 2, Firewall 4)
Security Camera (Response 2, Signal 3, System 2, Firewall 4)
*5 hours - 13 hits
*5 hours - 13 hits
*Node's Analyze + Firewall (3) to detect intrusion: 2 hits, undetected
*Node's Analyze + Firewall (Stealth 3) to detect intrusion: 2 hits, undetected


Dmitri now has admin access, and wants to edit the camera feed.
Dmitri now has admin access, and wants to edit the camera feed.
*Computer + Edit (2) - 2 hits, success
*Computer + Edit (1) - 2 hits, success


Dmitri's work is done, and he wants to cover his tracks. He needs to retrieve the access logs and remove himself from them.
Dmitri's work is done, and he wants to cover his tracks. He needs to retrieve the access logs and remove himself from them.
*Data Search + Browse (2) - 3 hits, success
*Data Search + Browse (Easy 2, 1 Initiative Pass) - 3 hits, success in 1 IP
*Hacking + Edit (2) - 3 hits, tracks covered
*Hacking + Edit (1) - 3 hits, tracks covered
 
==Golden Gate Facility Example==
Node
*Firewall 5, Response 4, Signal 2, System 5
*Analyze 5, Encrypt 5
*Authentication: Passkey
*Spiders: 1 Security Consultant and 1 Professional Spider on duty at all times.
*IC: 2 Watanabe Electric Kitsune 3 w/ custom sculpting per node (patrolling)
*ARC: Scramble Security Hacker
 
Probing the Target: Hacking + Exploit Test (System + Firewall + Admin 16, 1 hour) - 3 3 glitch - attempted thwarted after 3 hours
 
Second probing attempt: Hacking + Exploit (System + Firewall + Admin + Glitch 20, 1 hour) - 4 5 3 3 2 5 - completed in 6 hours
 
Welcome to the node, rolls to detect intrusion:
*Node's Analyze + Firewall (Stealth 5) - 3 hits, undetected
*MCT Bloodhound IC #1 Perception Test: IC Rating + Analyze (6) vs. Stealth + Hacking (9) Opposed Test - 1 hit vs. 2 hits - undetected
*6 users are logged in, Dmitri will be re-scanned on Turn 6.
*Passkey check will engage on Turn 5, likely triggering an alert
 
Insert fake accounts
*Turn 1 IP 1: Find user accounts: Data Search + Browse (Easy 2, 1 Initiative Pass) - 5 hits, success in 1 IP
*Turn 1 IP 2: Add fake admin account: Hacking + Edit (1) - 1 hit - success
*Turn 1 IP 3: Add fake security account: Hacking + Edit (1) - 1 hit - success
 
Data searches
*Turn 2: Find map: Data Search + Browse (Easy 2, 1 Initiative Pass) - 2 hits, success in 3 IP
*Turn 3 IP 1-2: Find access accounts: Data Search + Browse (Easy 2, 1 Initiative Pass) - 3 hits, success in 2 IP
*Turn 3-4 IP 1-2: Find data related to devices: Data Search + Browse (Difficult 8, 1 Initiative Pass) - 8 hits, success in 3 IP
*Turn 4 IP 3: Hacking + Edit (1) to clean tracks - 1 hit, success
 
Log out
 
To create fake passkey (to avoid the automatic passkey alert on the next break-in attempt)
*Hardware + Logic Extended Test (10, 1 day) - success, 2 days
 
To create forged keycard
*Hardware + Logic Extended Test (8, 1 hour) - success

Latest revision as of 21:54, 23 December 2010

Matrix General Notes

  • Perception Tests: Computer + Analyze
    • Standard perception test difficulty threshold
    • If target is intentionally hiding, Opposed Test vs. (Hacking/Firewall + Stealth)
    • For each net hit, you can ask for one piece of information about the object (type, rating, alert status, damage, anything else creative)
    • You can run Analyze to automatically scan and detect other users/icons (Simple Action)

Hacking: On the Fly

  • Hacking + Exploit (Firewall, 1 Initiative Pass)
    • Threshold modifiers: +3 for security access, +6 for admin access
    • Node gets Analyze + Firewall (Stealth) Test to detect intrusion.

Hacking: Probing the Target

  • Hacking + Exploit Test (System + Firewall, 1 hour VR/1 day AR) Extended Test
    • Threshold modifiers: +3 for security access, +6 for admin access
    • Hack automatically succeeds if probing is complete
    • Node gets Analyze + Firewall (Stealth) Test to detect intrusion.

Security Camera Example

Dmitri has some preparation time and uses the Probing the Target technique to gain admin access on the shed's security camera. This is a Hacking + Exploit Test (System + Firewall + Admin 12, 1 hour).

Security Camera (Response 2, Signal 3, System 2, Firewall 4)

  • 5 hours - 13 hits
  • Node's Analyze + Firewall (Stealth 3) to detect intrusion: 2 hits, undetected

Dmitri now has admin access, and wants to edit the camera feed.

  • Computer + Edit (1) - 2 hits, success

Dmitri's work is done, and he wants to cover his tracks. He needs to retrieve the access logs and remove himself from them.

  • Data Search + Browse (Easy 2, 1 Initiative Pass) - 3 hits, success in 1 IP
  • Hacking + Edit (1) - 3 hits, tracks covered

Golden Gate Facility Example

Node

  • Firewall 5, Response 4, Signal 2, System 5
  • Analyze 5, Encrypt 5
  • Authentication: Passkey
  • Spiders: 1 Security Consultant and 1 Professional Spider on duty at all times.
  • IC: 2 Watanabe Electric Kitsune 3 w/ custom sculpting per node (patrolling)
  • ARC: Scramble Security Hacker

Probing the Target: Hacking + Exploit Test (System + Firewall + Admin 16, 1 hour) - 3 3 glitch - attempted thwarted after 3 hours

Second probing attempt: Hacking + Exploit (System + Firewall + Admin + Glitch 20, 1 hour) - 4 5 3 3 2 5 - completed in 6 hours

Welcome to the node, rolls to detect intrusion:

  • Node's Analyze + Firewall (Stealth 5) - 3 hits, undetected
  • MCT Bloodhound IC #1 Perception Test: IC Rating + Analyze (6) vs. Stealth + Hacking (9) Opposed Test - 1 hit vs. 2 hits - undetected
  • 6 users are logged in, Dmitri will be re-scanned on Turn 6.
  • Passkey check will engage on Turn 5, likely triggering an alert

Insert fake accounts

  • Turn 1 IP 1: Find user accounts: Data Search + Browse (Easy 2, 1 Initiative Pass) - 5 hits, success in 1 IP
  • Turn 1 IP 2: Add fake admin account: Hacking + Edit (1) - 1 hit - success
  • Turn 1 IP 3: Add fake security account: Hacking + Edit (1) - 1 hit - success

Data searches

  • Turn 2: Find map: Data Search + Browse (Easy 2, 1 Initiative Pass) - 2 hits, success in 3 IP
  • Turn 3 IP 1-2: Find access accounts: Data Search + Browse (Easy 2, 1 Initiative Pass) - 3 hits, success in 2 IP
  • Turn 3-4 IP 1-2: Find data related to devices: Data Search + Browse (Difficult 8, 1 Initiative Pass) - 8 hits, success in 3 IP
  • Turn 4 IP 3: Hacking + Edit (1) to clean tracks - 1 hit, success

Log out

To create fake passkey (to avoid the automatic passkey alert on the next break-in attempt)

  • Hardware + Logic Extended Test (10, 1 day) - success, 2 days

To create forged keycard

  • Hardware + Logic Extended Test (8, 1 hour) - success