20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

to Mook or not to Mook?<br />

For some characters, particularly those just<br />

starting out, it may look like a better deal to invest<br />

in a high-rated commlink, OS, and an agent<br />

(the mook) to take care of all of your hacking<br />

needs. Using a mook isn’t against the rules, nor<br />

is it gamebreaking, but players and gamemaster<br />

should both be aware and the advantages and<br />

disadvantages of the situation.<br />

When mooks are used en masse, or combined<br />

with botnets, a non-hacker character could potentially<br />

maintain a small army of agents and terrorize<br />

the Matrix from the relative safety of an AR interface.<br />

Mooks aren’t a perfect replacement for<br />

hackers, however, for several reasons. For starters,<br />

agents are really only adept at following orders—<br />

so-called agent scripts (p. 100)—and are not very<br />

useful at handling decisions on their own. For more<br />

details on this, see Agent Competency, p. 111.<br />

Still, mooks are useful as a trained dog—just<br />

point at the target and say go. They are also inherently<br />

replaceable—one gets trashed, load up<br />

another. Even a high-rating mook won’t roll as<br />

many dice as a hacker with good skills, programs,<br />

and right implants, however. As a second-string<br />

team or backup plan, however, mooks certainly<br />

make sense. Don’t expect to use a mob of copied<br />

agents to gang up on a target, though, as their<br />

built-in access IDs will keep all but one out of node<br />

(see Autonomous Programs, p. 110).<br />

Note that commercially-bought legal agents<br />

have built-in limitations that prevent them from<br />

taking any illegal action—broadly, this means they<br />

won’t perform any action that requires a Hacking<br />

Test, even if they have the correct program loaded,<br />

though gamemasters may rule this is a much<br />

broader restriction on any blatantly illegal Matrix<br />

activity. Hackers can remove these limitations<br />

with an Extended Software + Logic (13 + Rating,<br />

1 hour) Test, code agents without them, or buy<br />

unrestricted agents from other hackers.<br />

The main drawback to a mook is that a character<br />

that relies on them will almost never develop<br />

their Cracking group skills and will miss out on<br />

most of the fun of Matrix.<br />

It’s worth keeping in mind that player characters<br />

aren’t the only ones that could use mooks;<br />

non-player characters are as likely to use a mook<br />

if they lack Matrix skills, and gamemasters can<br />

use that to their advantage.<br />

deniaL of Service attackS<br />

A denial of service (DOS) attack is a method of keeping legitimate<br />

users from accessing a specific node, or even the Matrix at<br />

large. Cutting off traffic to a specific node could be the beginning<br />

Unwired<br />

of a plan for extortion, or an effort to prevent outside reinforcements<br />

from entering a node while a hacker is busy working with<br />

it. More simply, a DOS attack can prevent someone from calling<br />

for help using their commlink or from getting directions while<br />

in their vehicle. Devices that a legitimate user cannot access are<br />

much more susceptible to spoofing because legitimate users cannot<br />

counteract the orders given them.<br />

The central focus of most DOS attacks is a node’s active account<br />

list; by editing the list a hacker can sever a connection (see<br />

Terminate Connection, p. 223, SR4). A hacker can also instruct the<br />

node to block future access connection requests from a particular<br />

node or access ID (or a range of nodes/access IDs), locking the<br />

target out. To accomplish this, the hacker must have access to the<br />

node and must make a Computer + Edit (1) Test if they have security<br />

or admin privileges; or a Hacking + Edit (2) Test if he does<br />

not. Accounts may also be deleted (if active, the user’s connection<br />

must be terminated first) with a successful Software + Editing (1)<br />

Test, assuming you have security or admin privileges; Hacking +<br />

Edit (2) Test if you do not.<br />

There are many other ways to accomplish a DOS attack: jamming<br />

a wireless device, cutting the hardlines on a physical network,<br />

or changing the routing to prevent traffic in or out of the target<br />

node all accomplishes the same task. Causing the system to crash<br />

can also achieve the same effect, though only for the amount of<br />

time it takes the system to reboot.<br />

distributed denial of Service attacks (ddoS)<br />

Hackers can also use botnets (p. 100) to perform a form of<br />

denial of service attack that is generally easier to accomplish than<br />

hacking the target node directly. Even in the 2070s, nodes have<br />

limits to the number of data transfers and access requests they can<br />

handle at once, though this is rarely an issue. A hacker performing<br />

a DDOS attempts to overload the node by having a botnet flood<br />

it with traffic of all kinds.<br />

In most cases, DDOS attacks require massively large botnets.<br />

For standard nodes, reduce the target node’s Response by 1 for every<br />

System x 4 bots flooding it with traffic. A node with System 5 and<br />

Response 5, for example, hit by a DDOS attack from a botnet with<br />

100 bots, would have its Response reduced to 0, freezing all activity<br />

on the node. Even if the node is rebooted, it will be slammed with<br />

traffic as soon as it starts again, until the DDOS attack ends.<br />

A node under DDOS attack has three options. First, it can<br />

spoof its access ID, so that the DDOS can no longer find its target.<br />

The node must be offline (not meshed with other nodes) to switch<br />

access ID. Second, it can try to block access from botnet access<br />

IDs or attempt to filter out all flooding traffic. The success of these<br />

latter options is largely up to the gamemaster’s discretion.<br />

MaSS attackS<br />

A mass attack refers to a team of hackers pooling their resources<br />

to hack a particular system. Functionally, a mass attack<br />

is Probing the Target (see Probing the Target, p. 221, SR4) with a<br />

Teamwork Test. Hackers and technomancers can work together<br />

on mass attacks. If the test is successful, all of the participating<br />

hackers gain access to the node.<br />

Agents and sprites cannot participate directly in Teamwork<br />

Tests, but add +1 die to the prime character’s dice pool for each<br />

agent or sprite assisting (maximum +5).<br />

Simon Wentworth (order #1132857) 9<br />

101<br />

hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!