Yeah, I mean... Byte is already starting to process of hacking the target's central node, instead of waiting until we get there and doing it all on the fly. I'm hoping that, by the time the crew gets to the target for the hit, Byte will already have the entire system cracked and waiting for his command to open up.
If nothin' really happens today, I'll just go ahead and do my rolls as if I were on the same grid as the target, since that is the point of the Matrix Perception test. (A shitty little drug house shouldn't offer much resistance to Byte, assuming it's in a low to medium area. If it's street-level, there's almost no point in making the rolls, lmfao.)
Edit: Alright, so in this case... Still gonna be doing everything through AR, since I need to be able to keep up with Viso and FP. But, I'm going to assume I sleaze my way onto the grid the Central Node of the house is on, then proceed to probe it and slow hack it. I'll use more brute force if the time starts running out before the hit starts... Though I realize, there is no simple "sleaze" action in SR5... Only the "Hack on the Fly" is there to place a mark without attacking and alerting the target... Ah well.
CURRENT SET-UP (as last seen in the IC thread):6 Sleaze, 5+1 Data Processing, 5 Attack, 3 Firewall: Signal Scrub(-2 Noise), Toolbox(+1 Data Processing), Virtual Machine, Exploit(+2 Sleaze when Hacking on Fly) and Baby Monitor. (Programs in Core Rulebook [2nd Printing] p.245) Also, all Matrix Actions start on Page 238.
Obviously, I will be running silent. First is hopping grids. Reading the book, I don't alert GOD if I fail this role, so just going with it:
Hoping Grids:
11d6t5 6 (Yup. That's a hit.) Then I ofc hop grids to the one that houses the target.
Second, since I should be aware of which icon belongs to my target, I want to try and place 2 marks on it (Hack on Fly -4 dice):
2 Mark Hack on Fly Target's House:
7d6t5 3 (Should be good if they don't get a perfect roll.)
Third, I want to place a 3rd mark on it:
3rd Mark on Target's House:
11d6t5 6 (That's a hit!) So, I'll enter the host at this point and check my Overwatch score via the Baby Monitor. (Should still be golden right now though.)
Fourth would be the backdoor, but I don't really see anywhere where it mentions backdoors, let alone how I might set one up... So, in order to dance around the rules, since I already have 100% access to the Central Node, I'm just going to add the access Byte is using to hack to the Node's user-list as an admin. To do this I will first use a Matrix Perception to find the relevant Data:
Matrix Perception in Target:
12d6t5 2 The two hits should let me find 2 files: The file I need to edit in order to give Byte his log-on, and the Log File which keeps track of everything that happens on the node and all connections.
Finding those, Byte swaps out his Exploit program for his Edit program (Making Data Processing 5+1+2=8.):
Editing User List:
13d6t5 5 That should be enough to completely add Byte as an admin user, so he doesn't have to hack the node again.
After doing that, Byte is going to erase his tracks from the Log file, so they can't simply trace him:
Editing Log File:
13d6t5 5 That should be enough to erase most, if not all of Byte's tracks. (Aside from his disconnecting, of course.)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN SUMMARY:
Byte hopped grids, placed 3 marks on the target, entered the target, searched for the User-List file and Log file, added himself as an admin, and removed from the log: His access as an Admin (3 marks), his adding a new user, his time spent logged on and alter his connecting information.
This should allow Byte to log onto the target freely (as long as the owner of the node isn't aware of the added user and deletes it.) and the log should make Byte's connecting look like any other random connection that was bounced through that node.