Hacking
Gaining root access to a network requires talent, creativity and patience, and often results in a battle of wits with the systemÕs administrator(s). Before the hacking attempt begins, the Storyteller determines the network's level of security. If there is a system administrator on duty, the hacking attempt is an extended and contested action. If the network is protected by basic security software alone, the task is simply an extended action.
In a contested and extended action between hacker and sysadmin, roll Intelligence + Computer + any equipment modifiers for both participants. The winner is the first to accumulate the required number of successes. The hacker needs to accumulate a number of successes equal to the network's basic security setup. This can be anywhere from five to 10 based on the sophistication of the network. The sysadmin needs to accumulate a number of successes equal to the hacker's Intelligence + Computer. If the hacker wins, he gains unfettered access to the network. If the sysadmin wins, he kicks the hacker out of the network and can block any further attempts from that invader that day.
Example: Greg is hacking into the network of a local financial group, which is protected by an on-duty sysadmin. Greg's Intelligence is 4, his Computer is 3 and he's using an average computer setup (no bonus dice). The sysadmin's Intelligence is 3, his Computer is 3 and he's using a decent system that gives him a +1 modifier. The network's basic security software requires seven successes to be overcome. The sysadmin also needs to accumulate seven successes (the total of Greg's Intelligence + Computer). The first rolls net three successes for Greg and two successes for the sysadmin. Greg needs to gain four more successes to make it past the sysadmin and gain access, while the sysadmin needs to accumulate five more successes to kick the intruder out of his network.
If the network is protected by basic security software alone, the hacker needs to accumulate a number of successes equal to the network's basic security setup, as above.
Example: Later, Greg tries to hack into the network of the city's Department of Motor Vehicles. The DMV network doesn't have a sysadmin on duty, so the task is an extended roll. The network's basic security software requires six successes to be overcome, so Greg simply needs to keep hacking at the system (and not suffer any dramatic failures) to get in.
Failure: Your character does not succeed in making any headway in his effort.
Success: Your character makes progress in his effort.
Exceptional Success: Your character has found a vulnerability he can exploit against his opponent, giving him a substantial advantage (as reflected in the number of successes you achieve in one roll).
Suggested Equipment: High-performance computer (+1 to +3), broadband Internet access (+1), disk of scripts (+2), system passwords (+3)
Possible Penalties: Outdated computer system (-2), slow Internet connection (-3)
In a contested and extended action between hacker and sysadmin, roll Intelligence + Computer + any equipment modifiers for both participants. The winner is the first to accumulate the required number of successes. The hacker needs to accumulate a number of successes equal to the network's basic security setup. This can be anywhere from five to 10 based on the sophistication of the network. The sysadmin needs to accumulate a number of successes equal to the hacker's Intelligence + Computer. If the hacker wins, he gains unfettered access to the network. If the sysadmin wins, he kicks the hacker out of the network and can block any further attempts from that invader that day.
Example: Greg is hacking into the network of a local financial group, which is protected by an on-duty sysadmin. Greg's Intelligence is 4, his Computer is 3 and he's using an average computer setup (no bonus dice). The sysadmin's Intelligence is 3, his Computer is 3 and he's using a decent system that gives him a +1 modifier. The network's basic security software requires seven successes to be overcome. The sysadmin also needs to accumulate seven successes (the total of Greg's Intelligence + Computer). The first rolls net three successes for Greg and two successes for the sysadmin. Greg needs to gain four more successes to make it past the sysadmin and gain access, while the sysadmin needs to accumulate five more successes to kick the intruder out of his network.
If the network is protected by basic security software alone, the hacker needs to accumulate a number of successes equal to the network's basic security setup, as above.
Example: Later, Greg tries to hack into the network of the city's Department of Motor Vehicles. The DMV network doesn't have a sysadmin on duty, so the task is an extended roll. The network's basic security software requires six successes to be overcome, so Greg simply needs to keep hacking at the system (and not suffer any dramatic failures) to get in.
Roll Results
Dramatic Failure: A dramatic failure on the part of the hacker indicates that he's been kicked out of the network and can't access it again for 24 hours. Worse, if a sysadmin contests the task, make another Intelligence + Computer roll to determine if the admin manages to gain the IP address of the hacker. A dramatic failure on the part of the sysadmin indicates that the hacker brushes aside his efforts and penetrates the network automatically.Failure: Your character does not succeed in making any headway in his effort.
Success: Your character makes progress in his effort.
Exceptional Success: Your character has found a vulnerability he can exploit against his opponent, giving him a substantial advantage (as reflected in the number of successes you achieve in one roll).
Suggested Equipment: High-performance computer (+1 to +3), broadband Internet access (+1), disk of scripts (+2), system passwords (+3)
Possible Penalties: Outdated computer system (-2), slow Internet connection (-3)
Dice Pool: Intelligence + Computer + equipment versus Intelligence + Computer + equipment
Action: Extended and contested (5-10+ successes; each roll represents 30 minutes of programming)