Shadowrun: Matrix Notes: Difference between revisions
(New page: ==Matrix General Notes== *Perception Tests: Computer + Analyze **Standard perception test difficulty threshold **If target is intentionally hiding, Opposed Test vs. (Hacking/Firewall + Ste...) |
No edit summary |
||
Line 18: | Line 18: | ||
==Security Camera Example== | ==Security Camera Example== | ||
Dmitri has some preparation time and uses the Probing the Target technique to gain admin access on the shed's security camera. This is a Hacking + Exploit Test (12, 1 hour). | Dmitri has some preparation time and uses the Probing the Target technique to gain admin access on the shed's security camera. This is a Hacking + Exploit Test (System + Firewall + Admin 12, 1 hour). | ||
Security Camera (Response 2, Signal 3, System 2, Firewall 4) | Security Camera (Response 2, Signal 3, System 2, Firewall 4) | ||
*5 hours - 13 hits | *5 hours - 13 hits | ||
*Node's Analyze + Firewall (3) to detect intrusion: 2 hits, undetected | *Node's Analyze + Firewall (Stealth 3) to detect intrusion: 2 hits, undetected | ||
Dmitri now has admin access, and wants to edit the camera feed. | Dmitri now has admin access, and wants to edit the camera feed. | ||
*Computer + Edit ( | *Computer + Edit (1) - 2 hits, success | ||
Dmitri's work is done, and he wants to cover his tracks. He needs to retrieve the access logs and remove himself from them. | Dmitri's work is done, and he wants to cover his tracks. He needs to retrieve the access logs and remove himself from them. | ||
*Data Search + Browse (2) - 3 hits, success | *Data Search + Browse (Easy 2, 1 Initiative Pass) - 3 hits, success in 1 IP | ||
*Hacking + Edit (2) - 3 hits, tracks | *Hacking + Edit (1) - 3 hits, tracks covered | ||
==Golden Gate Facility Example== | |||
Node | |||
*Firewall 5, Response 4, Signal 2, System 5 | |||
*Analyze 5, Encrypt 5 | |||
*Authentication: Passkey | |||
*Spiders: 1 Security Consultant and 1 Professional Spider on duty at all times. | |||
*IC: 2 Watanabe Electric Kitsune 3 w/ custom sculpting per node (patrolling) | |||
*ARC: Scramble Security Hacker | |||
Probing the Target: Hacking + Exploit Test (System + Firewall + Admin 16, 1 hour) - 3 3 glitch - attempted thwarted after 3 hours | |||
Second probing attempt: Hacking + Exploit (System + Firewall + Admin + Glitch 20, 1 hour) - 4 5 3 3 2 5 - completed in 6 hours | |||
Welcome to the node, rolls to detect intrusion: | |||
*Node's Analyze + Firewall (Stealth 5) - 3 hits, undetected | |||
*MCT Bloodhound IC #1 Perception Test: IC Rating + Analyze (6) vs. Stealth + Hacking (9) Opposed Test - 1 hit vs. 2 hits - undetected | |||
*6 users are logged in, Dmitri will be re-scanned on Turn 6. | |||
*Passkey check will engage on Turn 5, likely triggering an alert | |||
Insert fake accounts | |||
*Turn 1 IP 1: Find user accounts: Data Search + Browse (Easy 2, 1 Initiative Pass) - 5 hits, success in 1 IP | |||
*Turn 1 IP 2: Add fake admin account: Hacking + Edit (1) - 1 hit - success | |||
*Turn 1 IP 3: Add fake security account: Hacking + Edit (1) - 1 hit - success | |||
Data searches | |||
*Turn 2: Find map: Data Search + Browse (Easy 2, 1 Initiative Pass) - 2 hits, success in 3 IP | |||
*Turn 3 IP 1-2: Find access accounts: Data Search + Browse (Easy 2, 1 Initiative Pass) - 3 hits, success in 2 IP | |||
*Turn 3-4 IP 1-2: Find data related to devices: Data Search + Browse (Difficult 8, 1 Initiative Pass) - 8 hits, success in 3 IP | |||
*Turn 4 IP 3: Hacking + Edit (1) to clean tracks - 1 hit, success | |||
Log out | |||
To create fake passkey (to avoid the automatic passkey alert on the next break-in attempt) | |||
*Hardware + Logic Extended Test (10, 1 day) - success, 2 days | |||
To create forged keycard | |||
*Hardware + Logic Extended Test (8, 1 hour) - success |
Latest revision as of 21:54, 23 December 2010
Matrix General Notes
- Perception Tests: Computer + Analyze
- Standard perception test difficulty threshold
- If target is intentionally hiding, Opposed Test vs. (Hacking/Firewall + Stealth)
- For each net hit, you can ask for one piece of information about the object (type, rating, alert status, damage, anything else creative)
- You can run Analyze to automatically scan and detect other users/icons (Simple Action)
Hacking: On the Fly
- Hacking + Exploit (Firewall, 1 Initiative Pass)
- Threshold modifiers: +3 for security access, +6 for admin access
- Node gets Analyze + Firewall (Stealth) Test to detect intrusion.
Hacking: Probing the Target
- Hacking + Exploit Test (System + Firewall, 1 hour VR/1 day AR) Extended Test
- Threshold modifiers: +3 for security access, +6 for admin access
- Hack automatically succeeds if probing is complete
- Node gets Analyze + Firewall (Stealth) Test to detect intrusion.
Security Camera Example
Dmitri has some preparation time and uses the Probing the Target technique to gain admin access on the shed's security camera. This is a Hacking + Exploit Test (System + Firewall + Admin 12, 1 hour).
Security Camera (Response 2, Signal 3, System 2, Firewall 4)
- 5 hours - 13 hits
- Node's Analyze + Firewall (Stealth 3) to detect intrusion: 2 hits, undetected
Dmitri now has admin access, and wants to edit the camera feed.
- Computer + Edit (1) - 2 hits, success
Dmitri's work is done, and he wants to cover his tracks. He needs to retrieve the access logs and remove himself from them.
- Data Search + Browse (Easy 2, 1 Initiative Pass) - 3 hits, success in 1 IP
- Hacking + Edit (1) - 3 hits, tracks covered
Golden Gate Facility Example
Node
- Firewall 5, Response 4, Signal 2, System 5
- Analyze 5, Encrypt 5
- Authentication: Passkey
- Spiders: 1 Security Consultant and 1 Professional Spider on duty at all times.
- IC: 2 Watanabe Electric Kitsune 3 w/ custom sculpting per node (patrolling)
- ARC: Scramble Security Hacker
Probing the Target: Hacking + Exploit Test (System + Firewall + Admin 16, 1 hour) - 3 3 glitch - attempted thwarted after 3 hours
Second probing attempt: Hacking + Exploit (System + Firewall + Admin + Glitch 20, 1 hour) - 4 5 3 3 2 5 - completed in 6 hours
Welcome to the node, rolls to detect intrusion:
- Node's Analyze + Firewall (Stealth 5) - 3 hits, undetected
- MCT Bloodhound IC #1 Perception Test: IC Rating + Analyze (6) vs. Stealth + Hacking (9) Opposed Test - 1 hit vs. 2 hits - undetected
- 6 users are logged in, Dmitri will be re-scanned on Turn 6.
- Passkey check will engage on Turn 5, likely triggering an alert
Insert fake accounts
- Turn 1 IP 1: Find user accounts: Data Search + Browse (Easy 2, 1 Initiative Pass) - 5 hits, success in 1 IP
- Turn 1 IP 2: Add fake admin account: Hacking + Edit (1) - 1 hit - success
- Turn 1 IP 3: Add fake security account: Hacking + Edit (1) - 1 hit - success
Data searches
- Turn 2: Find map: Data Search + Browse (Easy 2, 1 Initiative Pass) - 2 hits, success in 3 IP
- Turn 3 IP 1-2: Find access accounts: Data Search + Browse (Easy 2, 1 Initiative Pass) - 3 hits, success in 2 IP
- Turn 3-4 IP 1-2: Find data related to devices: Data Search + Browse (Difficult 8, 1 Initiative Pass) - 8 hits, success in 3 IP
- Turn 4 IP 3: Hacking + Edit (1) to clean tracks - 1 hit, success
Log out
To create fake passkey (to avoid the automatic passkey alert on the next break-in attempt)
- Hardware + Logic Extended Test (10, 1 day) - success, 2 days
To create forged keycard
- Hardware + Logic Extended Test (8, 1 hour) - success