DeckerMan™ and his team are sitting at a locked security door and need to open it. There is a Maglock/keypad there, but they don't have a card or code for it.
To hack
Maglocks with Keypads you:
First you remove the casing with a
Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test.
If the maglock have anti-tamper system you also need to take a
Locksmith + Agility [Physical] (anti-tamper system rating) Test
To rewire the internal electronics you take a
Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test.
...or you use a Sequencer (p 448) with a
Sequencer rating vs Maglock Rating Opposed Test
(you get a positive dice pool modifier of 1 dice if wireless ON)
to re-assemble the case after the lock is picked you take a
Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test.
To hack
Maglock with Cardreader you:
You can copy a valid key with a keycard copier (p. 447) with a
Hardware + Logic [Mental] (2) Test
(require a hardware kit and take about 10 minutes)
When you use the forged keycard you take a
Keycard copier rating x 2 vs Maglock Rating x 2 Opposed Test
Or you can use a Maglock passkey "skeleton key" (p. 448) with a
Maglock Passkey Rating vs Maglock Rating Opposed Test
(you get a positive dice pool modifier of 1 dice if wireless ON)
...Or you remove the casing with a
Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test.
If the maglock have anti-tamper system you also need to take a
Locksmith + Agility [Physical] (anti-tamper system rating) Test
To rewire the internal electronics you take a
Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test.
to re-assemble the case after the lock is picked you take a
Locksmith + Agility [Physical] (Maglock Rating x 2, 1 Combat Turn) Extended Test.
A decker or technomancer can also
Hack Maglocks from the Matrix.
You can hack the lock from AR, cold-sim VR or hot-sim VR (VR = ragdoll mode).
The cyberprogram Fork (p. 245) can be used to hack two locks at the same time without splitting the pool.
First you need a mark on the lock which is either a
Hacking + Logic [Sleaze] v. Intuition + Firewall Opposed Test
(Hack on the Fly)
or a
Cybercombat + Logic [Attack] v. Willpower + Firewall Opposed Test
(Brute Force)
Then you Control the device to open with a
Electronic Warfare + Intuition [Sleaze] v. Intuition + Firewall Test
(Control Device)
You can control multiple devices at once.
- You need marks on them all and you have to split your dice pool,
but the actions you control them to take does not have to be the same.
(Fork also let you control two devices at once, but in this case you need to control them to take the exact same action).
If you already have a mark on the owner of the lock you can instead take a
Hacking + Intuition [Sleaze] v. Logic + Firewall Test
(Spoof Command; this does not require a mark on the lock)
Depending on your reading a Technomancer can instead also take a
Software + Resonance [Level] v. Willpower + Firewall Test
(Puppeteer; this does not require a mark on the lock)
DeckerMan™ pulls out his cable and connects to the Universal Data Connector (UDC) on the keypad in order to make a "direct connection".
• Why would anyone put a UDC on a keypad? Don't people realize hackers can do this and then just stop putting UDCs on anything/everything?
Most public accessible devices are probably not slaved at all (since it compromise the security of the host), but there will be exceptions (but maybe you need to do at least some basic breaking and entering before you can physically reach one). And the UDC does not have to be easy to access since most of the time you would access it wireless anyway. But all devices have a UDC (or else you can't access it at all if you ever turn wireless OFF - which for the owner is a free action... imagine the support calls you would get "i accidentally turned my maglock wireless OFF, again, and now I can't turn it on-line again...").
DeckerMan™ uses a "Brute Force" or "Hack on the Fly" Action to get a Mark on the device (maglock/keypad), he can do this due to having a direct connection (DC).
He can do this by accessing it on the grid like he would from home.
Or by accessing it directly from within the host it is slaved to.
The reason why he establish a direct connection is because he don't have a mark on the host yet and because he don't want to roll against high host ratings. If it is not slaved to a host then you don't need to fight high host ratings so there is really no reason to establish a direct connection to it (exception being if it is a throwback or for some other reason a wireless OFF device).
The Device only gets to resist the attempt using it's own device rating, and gets no firewall
sR5 p. 234 Devices
Devices have a smaller-than-person-sized icon in the Matrix. They also have three ratings: a Device Rating and two of the Matrix attributes, Data Processing and Firewall. For most devices, the Matrix attributes are the same as the Device Rating.DeckerMan™ now also has an automatic free Mark on the host that the device is connected to, in this case the security host.
Yes.