comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
comStar Firewall alert - PhaseThrough
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
to Mook or not to Mook?<br />
For some characters, particularly those just<br />
starting out, it may look like a better deal to invest<br />
in a high-rated commlink, OS, and an agent<br />
(the mook) to take care of all of your hacking<br />
needs. Using a mook isn’t against the rules, nor<br />
is it gamebreaking, but players and gamemaster<br />
should both be aware and the advantages and<br />
disadvantages of the situation.<br />
When mooks are used en masse, or combined<br />
with botnets, a non-hacker character could potentially<br />
maintain a small army of agents and terrorize<br />
the Matrix from the relative safety of an AR interface.<br />
Mooks aren’t a perfect replacement for<br />
hackers, however, for several reasons. For starters,<br />
agents are really only adept at following orders—<br />
so-called agent scripts (p. 100)—and are not very<br />
useful at handling decisions on their own. For more<br />
details on this, see Agent Competency, p. 111.<br />
Still, mooks are useful as a trained dog—just<br />
point at the target and say go. They are also inherently<br />
replaceable—one gets trashed, load up<br />
another. Even a high-rating mook won’t roll as<br />
many dice as a hacker with good skills, programs,<br />
and right implants, however. As a second-string<br />
team or backup plan, however, mooks certainly<br />
make sense. Don’t expect to use a mob of copied<br />
agents to gang up on a target, though, as their<br />
built-in access IDs will keep all but one out of node<br />
(see Autonomous Programs, p. 110).<br />
Note that commercially-bought legal agents<br />
have built-in limitations that prevent them from<br />
taking any illegal action—broadly, this means they<br />
won’t perform any action that requires a Hacking<br />
Test, even if they have the correct program loaded,<br />
though gamemasters may rule this is a much<br />
broader restriction on any blatantly illegal Matrix<br />
activity. Hackers can remove these limitations<br />
with an Extended Software + Logic (13 + Rating,<br />
1 hour) Test, code agents without them, or buy<br />
unrestricted agents from other hackers.<br />
The main drawback to a mook is that a character<br />
that relies on them will almost never develop<br />
their Cracking group skills and will miss out on<br />
most of the fun of Matrix.<br />
It’s worth keeping in mind that player characters<br />
aren’t the only ones that could use mooks;<br />
non-player characters are as likely to use a mook<br />
if they lack Matrix skills, and gamemasters can<br />
use that to their advantage.<br />
deniaL of Service attackS<br />
A denial of service (DOS) attack is a method of keeping legitimate<br />
users from accessing a specific node, or even the Matrix at<br />
large. Cutting off traffic to a specific node could be the beginning<br />
Unwired<br />
of a plan for extortion, or an effort to prevent outside reinforcements<br />
from entering a node while a hacker is busy working with<br />
it. More simply, a DOS attack can prevent someone from calling<br />
for help using their commlink or from getting directions while<br />
in their vehicle. Devices that a legitimate user cannot access are<br />
much more susceptible to spoofing because legitimate users cannot<br />
counteract the orders given them.<br />
The central focus of most DOS attacks is a node’s active account<br />
list; by editing the list a hacker can sever a connection (see<br />
Terminate Connection, p. 223, SR4). A hacker can also instruct the<br />
node to block future access connection requests from a particular<br />
node or access ID (or a range of nodes/access IDs), locking the<br />
target out. To accomplish this, the hacker must have access to the<br />
node and must make a Computer + Edit (1) Test if they have security<br />
or admin privileges; or a Hacking + Edit (2) Test if he does<br />
not. Accounts may also be deleted (if active, the user’s connection<br />
must be terminated first) with a successful Software + Editing (1)<br />
Test, assuming you have security or admin privileges; Hacking +<br />
Edit (2) Test if you do not.<br />
There are many other ways to accomplish a DOS attack: jamming<br />
a wireless device, cutting the hardlines on a physical network,<br />
or changing the routing to prevent traffic in or out of the target<br />
node all accomplishes the same task. Causing the system to crash<br />
can also achieve the same effect, though only for the amount of<br />
time it takes the system to reboot.<br />
distributed denial of Service attacks (ddoS)<br />
Hackers can also use botnets (p. 100) to perform a form of<br />
denial of service attack that is generally easier to accomplish than<br />
hacking the target node directly. Even in the 2070s, nodes have<br />
limits to the number of data transfers and access requests they can<br />
handle at once, though this is rarely an issue. A hacker performing<br />
a DDOS attempts to overload the node by having a botnet flood<br />
it with traffic of all kinds.<br />
In most cases, DDOS attacks require massively large botnets.<br />
For standard nodes, reduce the target node’s Response by 1 for every<br />
System x 4 bots flooding it with traffic. A node with System 5 and<br />
Response 5, for example, hit by a DDOS attack from a botnet with<br />
100 bots, would have its Response reduced to 0, freezing all activity<br />
on the node. Even if the node is rebooted, it will be slammed with<br />
traffic as soon as it starts again, until the DDOS attack ends.<br />
A node under DDOS attack has three options. First, it can<br />
spoof its access ID, so that the DDOS can no longer find its target.<br />
The node must be offline (not meshed with other nodes) to switch<br />
access ID. Second, it can try to block access from botnet access<br />
IDs or attempt to filter out all flooding traffic. The success of these<br />
latter options is largely up to the gamemaster’s discretion.<br />
MaSS attackS<br />
A mass attack refers to a team of hackers pooling their resources<br />
to hack a particular system. Functionally, a mass attack<br />
is Probing the Target (see Probing the Target, p. 221, SR4) with a<br />
Teamwork Test. Hackers and technomancers can work together<br />
on mass attacks. If the test is successful, all of the participating<br />
hackers gain access to the node.<br />
Agents and sprites cannot participate directly in Teamwork<br />
Tests, but add +1 die to the prime character’s dice pool for each<br />
agent or sprite assisting (maximum +5).<br />
Simon Wentworth (order #1132857) 9<br />
101<br />
hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .