20.04.2013 Views

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

comStar Firewall alert - PhaseThrough

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

hacker’s handbook . . . . . . . . . . . . . . . . . . . . . . . . . .<br />

104<br />

a note on coMManding deviceS<br />

There’s more than one way to rig a drone. The same is true<br />

for other devices controlled through the Matrix. Here’s a quick<br />

and handy reference guide.<br />

issue remote commands<br />

You may remotely command any device that you have subscribed<br />

to your persona (p. 221, SR4) with a Simple Action (see Issuing<br />

Commands, p. 221, SR4). You do not need to be in the same node as<br />

the device, as long as it is subscribed and your command can reach<br />

them. Multiple devices may be controlled as a single subscription,<br />

but this means they all receive the same command. Nodes, devices,<br />

agents, drones, sprites, etc. may all be commanded this way.<br />

In this case, the commanded device acts on the orders independently<br />

on its own action. Pilot + autosofts are used for any<br />

relevant tests. If the orders are complex, the gamemaster can<br />

roll Pilot + Response to see if the device comprehends them<br />

(see p. 111). More complicated orders can be issued in the way of<br />

scripts (see Agent Scripts, p. 105).<br />

remote control<br />

Rather than letting the device operate on its own, you may<br />

access it directly via AR or VR, using the Command program (see<br />

Controlling Devices, p. 220). You must either log in to the device<br />

or subscribe it to your persona. The program provides you with<br />

a virtual interface, allowing you to control the device like a video<br />

game. Most devices have built-in Command programs, which<br />

you can run if you lack your own.<br />

A remote-controlled device acts on your Initiative. All tests<br />

are made by you, using Command + an appropriate skill. For<br />

example, to fire a gun emplacement, you would roll Command +<br />

Automatics. To maneuver a rotordrone around a tree, you would<br />

use Command + Pilot Aircraft +/– Handling.<br />

Devices, agents, and drones may all be remote controlled<br />

this way.<br />

Jump in<br />

Your final, and most direct, option is to “jump into” the device<br />

with a Simple Action via full-immersion VR (see Jumping Into<br />

Drones, p. 239, SR4). This is only possible with devices that have<br />

rigger adaptation (p. 341, SR4), typically drones and vehicles. In<br />

rare occasions, other devices will feature rigger adaptation.<br />

Devices rigged this way act on the rigger’s Initiative, and<br />

tests are made using the rigger’s skill + appropriate vehicle attribute<br />

(see Common Rigger/Drone Tests, p. 105).<br />

multiple levels of access, linked passcodes or nanotech passkeys, encryption,<br />

data bombs set to activate during off-hours, and proactive<br />

IC. If a hacker does manage to access a nanofax or nanoforge, they’re<br />

limited to producing items that the nanomanufacturing device that<br />

they have the correct feedstocks to produce, and has nanoschematics<br />

for. Nanofaxes are further limited in that they can only create a specific<br />

type of gear, such as personal microtronics or pistols. If a nanofax<br />

or desktop nanoforge is compromised (an Active Alert) instead of<br />

shutting down it will self-destruct. Stolen nanofaxes and desktop<br />

nanoforges are typically ordered to self-destruct wirelessly, or do so<br />

Unwired<br />

automatically when they leave the range of the wifi<br />

network of the building they are in.<br />

Nanoschematics are kept in high-level security<br />

nodes, and legitimate users download them by logging<br />

onto the node with their passcodes and then<br />

verify their log-on by sending a valid license number<br />

that is hard-coded into the nanofax processor. The<br />

nanoschematics are encrypted when downloaded<br />

from the secure node. Provided the character has<br />

access to a nanofax, finding the license number<br />

requires a Hardware + Logic (4) Test. A nanofax<br />

license number only works with the appropriate<br />

matching account. Nanoschematics cost serious<br />

nuyen, and few show up on peer-to-peer file sharing<br />

networks (see Piracy, p. 94)<br />

proxy Servers<br />

A “proxy server” is a program routine that<br />

acts as a go-between, transferring data from a user<br />

(the “client”) to another user or node. The advantage<br />

to proxies is that they act as an intermediary,<br />

so the data seems to be coming from the proxy<br />

rather than the client. Hackers and shadowrunners<br />

find proxies very useful both as anonymous<br />

remailers (obfuscating the original message<br />

source) and to foil tracking attempts.<br />

Almost any node can be configured to act as a<br />

proxy server, though this typically requires admin<br />

access and a Computer + Edit (10, 1 Initiative Pass)<br />

Test to set-up (use Hacking in place of Computer<br />

if you do not have admin privileges). Once set up,<br />

messages that are sent from a client through the<br />

proxy server node will seem to have originated<br />

from the proxy node. In order to determine the<br />

source of a message, a hacker would need to trace<br />

the message back to the proxy server node and then<br />

hack that node’s access log (or request it from the<br />

admin/owner of the node, if they are cooperating).<br />

Anonymizing proxy servers are often set to not<br />

keep or to delete message transfer logs.<br />

A hacker can also route his connection through<br />

a proxy server as a means of hindering traces. This<br />

increases the threshold by +4 for Tracking Tests<br />

for each proxy server used. The drawback, however,<br />

is that each proxy server reduces the hacker’s<br />

Response by 1.<br />

Spotting traces<br />

It can be advantageous to know when someone is trying to<br />

track your datatrail (see Track, p. 219, SR4), so that you can redirect<br />

the trace or otherwise make haste. In order to spot a trace, you<br />

must be in the same node that the track attempt is launched in (if<br />

someone is attempting to track your datatrail from the access log<br />

of a node you are no longer in, for example, you will not know).<br />

Spotting the trace requires a simple Matrix Perception Test (1)<br />

Test. However, if the tracker is trying to keep the trace discreet,<br />

you must beat them in an Opposed Test pitting your Analyze +<br />

Computer versus their Track + Stealth.<br />

Simon Wentworth (order #1132857) 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!