BUILD YOUR OWN WORLD Like what you see? Become the Master of your own Universe!

Hacking Guide

If anything asks for a Computers Check, the DC is DC 13 + (4xTier) unless otherwise specified.   Step 0): Find an access point   • You need an access point to a system. This is probably a computer or terminal. In large systems, the access point might only have access to a small subset of the network, but can then be used as its own access point to penetrate deeper into the system.   • You'll also need to be able to interface with the AP -- typically a interface is provided (keyboard at desk etc), but sometimes you need to bring your own (datajack).   • You can avoid an interface by using a hacking kit, but you'll still need to interface with that hacking kit (often just a Datajack).   Step 1) Gain Access   • On a typical, unsecured system (no firewalls, or countermeasures) this is a DC 10 Computers check. Unlike the rest of the Computers skill, you can take 20 on this check even if you're untrained (takes 2 minutes).   • A typical secured system has a two-step authentication process to grant access (a physical key and a password, or a rotating password and a permanent password).   • Having one of these security objects (looting a security key or knowing a password) grants a +5 circumstance bonus on Computers checks for Access. These stack, for a total of +10 if you have both.   • If you don't have access to a system, you can attempt a Computers Check to hack it. These penalties also apply to all later Computers checks in this post.   • If you succeed, you gain Access (but not Root Access) to all parts of the system not behind a Firewall. If you took 20 on this check, you also trigger the penalties for failure.   • If you fail, you trigger countermeasure. Some countermeasures are booby-trapped, and activate the moment you interface with the device and only deactivate when you gain access. This means that, for example, a sysadmin would get an alert from the Alarm countermeasure that someone is accessing a device, but the alert disappeared in a couple rounds, so it's probably a legit user. But maybe corporate policy is to check the security camera to confirm just in case.   • If you fail by 5 or more and used an interface (instead of a hacking kit), the system will lock the interface. You cannot use that interface for a specified period of time.   • If you fail by 5 or more and you used a security object to gain a bonus on this check, those security objects are blacklisted by the entire network and no longer provide any bonuses to checks   • When you gain Access to a system or a portion of a system, the GM secretly rolls a Computers check for you. If you fail, and the current level of access has a Fake Shell countermeasure, you do not realize you're in a Fake Shell and all the data/commands/etc are fake and just seem real.   • Firewalls create "Layers" of access. You have access to everything not behind a firewall you haven't penetrated yet. Multiple Firewalls may make you have to make Multiple checks to get access from A to B and C. A > F > B > F > F > C, or might separate B and C. C < F < A > F > B, or something else. You get the picture.   Step 2) Woo! Access!   • You can do any of the computers basic functions. • You can view what modules and countermeasures are installed as far as your current access level can see. • You can access any modules that are not secured behind a firewall. • You can attempt to manipulate one countermeasure or module by making a Computers Check. You cannot take 20 on this check. Each module/countermeasure needs to be handled separately   • As a Standard Action (generally), you can activate or disable a countermeasure or module with a Computers check.   • As an extended action (generally 1 minute per tier) you can add or remove a module.   • You can attempt to hack any computer on the same network as this computer, if this computer has either access, limited access, or a control module (e.g., a terminal sending simulation instructions to a super computer, or a terminal accessing a mainframe) to the other computer. That treats this computer as an access point, and you need to gain access to the other device normally.   • You can attempt to gain Root Access, requiring an extra hard Computer check of DC = 33 + (4xTier). That's the normal Computers DC + 20.   Step 3) Root Access   • Different Firewalls might have different Root User lists behind them. If the RUL is different, you'll need to gain Root Access separately.   • You can access any information or function of the computer as a Standard Action, no checks needed.   • You can disable or manipulate countermeasures or modules as a Standard action with a DC 10 Computers check.

Comments

Please Login in order to comment!