Shadowrun: Matrix Notes

From The Whereabouts
Revision as of 21:54, 23 December 2010 by Kirkland (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Matrix General Notes

  • Perception Tests: Computer + Analyze
    • Standard perception test difficulty threshold
    • If target is intentionally hiding, Opposed Test vs. (Hacking/Firewall + Stealth)
    • For each net hit, you can ask for one piece of information about the object (type, rating, alert status, damage, anything else creative)
    • You can run Analyze to automatically scan and detect other users/icons (Simple Action)

Hacking: On the Fly

  • Hacking + Exploit (Firewall, 1 Initiative Pass)
    • Threshold modifiers: +3 for security access, +6 for admin access
    • Node gets Analyze + Firewall (Stealth) Test to detect intrusion.

Hacking: Probing the Target

  • Hacking + Exploit Test (System + Firewall, 1 hour VR/1 day AR) Extended Test
    • Threshold modifiers: +3 for security access, +6 for admin access
    • Hack automatically succeeds if probing is complete
    • Node gets Analyze + Firewall (Stealth) Test to detect intrusion.

Security Camera Example

Dmitri has some preparation time and uses the Probing the Target technique to gain admin access on the shed's security camera. This is a Hacking + Exploit Test (System + Firewall + Admin 12, 1 hour).

Security Camera (Response 2, Signal 3, System 2, Firewall 4)

  • 5 hours - 13 hits
  • Node's Analyze + Firewall (Stealth 3) to detect intrusion: 2 hits, undetected

Dmitri now has admin access, and wants to edit the camera feed.

  • Computer + Edit (1) - 2 hits, success

Dmitri's work is done, and he wants to cover his tracks. He needs to retrieve the access logs and remove himself from them.

  • Data Search + Browse (Easy 2, 1 Initiative Pass) - 3 hits, success in 1 IP
  • Hacking + Edit (1) - 3 hits, tracks covered

Golden Gate Facility Example

Node

  • Firewall 5, Response 4, Signal 2, System 5
  • Analyze 5, Encrypt 5
  • Authentication: Passkey
  • Spiders: 1 Security Consultant and 1 Professional Spider on duty at all times.
  • IC: 2 Watanabe Electric Kitsune 3 w/ custom sculpting per node (patrolling)
  • ARC: Scramble Security Hacker

Probing the Target: Hacking + Exploit Test (System + Firewall + Admin 16, 1 hour) - 3 3 glitch - attempted thwarted after 3 hours

Second probing attempt: Hacking + Exploit (System + Firewall + Admin + Glitch 20, 1 hour) - 4 5 3 3 2 5 - completed in 6 hours

Welcome to the node, rolls to detect intrusion:

  • Node's Analyze + Firewall (Stealth 5) - 3 hits, undetected
  • MCT Bloodhound IC #1 Perception Test: IC Rating + Analyze (6) vs. Stealth + Hacking (9) Opposed Test - 1 hit vs. 2 hits - undetected
  • 6 users are logged in, Dmitri will be re-scanned on Turn 6.
  • Passkey check will engage on Turn 5, likely triggering an alert

Insert fake accounts

  • Turn 1 IP 1: Find user accounts: Data Search + Browse (Easy 2, 1 Initiative Pass) - 5 hits, success in 1 IP
  • Turn 1 IP 2: Add fake admin account: Hacking + Edit (1) - 1 hit - success
  • Turn 1 IP 3: Add fake security account: Hacking + Edit (1) - 1 hit - success

Data searches

  • Turn 2: Find map: Data Search + Browse (Easy 2, 1 Initiative Pass) - 2 hits, success in 3 IP
  • Turn 3 IP 1-2: Find access accounts: Data Search + Browse (Easy 2, 1 Initiative Pass) - 3 hits, success in 2 IP
  • Turn 3-4 IP 1-2: Find data related to devices: Data Search + Browse (Difficult 8, 1 Initiative Pass) - 8 hits, success in 3 IP
  • Turn 4 IP 3: Hacking + Edit (1) to clean tracks - 1 hit, success

Log out

To create fake passkey (to avoid the automatic passkey alert on the next break-in attempt)

  • Hardware + Logic Extended Test (10, 1 day) - success, 2 days

To create forged keycard

  • Hardware + Logic Extended Test (8, 1 hour) - success