NEWS

Sins of the Fathers [IP] - A Side Quest

  • 591 Replies
  • 110332 Views

Jack_Spade

  • *
  • Prime Runner
  • *****
  • Posts: 6516
« Reply #465 on: <05-11-16/1702:03> »

Q: What assumption can bnc make about the system at the moment.
A: As mentioned this is a commercial host for the restaurant - there are public accessible areas inside and parts that are restricted. A patrol IC is active and tells everyone it can see if they are trespassing.

Q:I assume that they transfer sensitive data to an archive when the restaurant is closed (otherwised it would be an insane and stupid risk to come her at all).
A: You can assume that - if its true depends entirely on who operates the security of the host and how reliable they are in their work

Q:Is there a host for the restaurant?
A: Yes, as previously mentioned R5 A6 S5 D8 R7

Q: Is it sensible to assume that the interesting file are inside the host?
A: Very sensible

Q: Can I use Matrix Search to find out where the files are stored?
A: Once you are inside the host, sure. But this will bring you in conflict with the Patrol IC

Q: Can I assume that the waiters' commlinks are not directly linked to the host?
A: Why would you? Those are issued by the restaurant, not private links. Of course they are part of the WAN

Q: Do I know whether or net there is something like a server that keeps the data we are looking for?
A: You know there is the Host, as well as all the devices associated with the restaurant. But only the commlinks are visible in the matrix, the rest must run silent, because it is not readily apparent.


talk think matrix

To strive, to seek, to find and not to yield
Revenant Kynos Isaint Rex

SquirrelDude

  • *
  • Omae
  • ***
  • Posts: 868
« Reply #466 on: <05-14-16/1001:24> »
So what's your call, bnc?
"normal speech"
"under your breath"
thought
Astral
"Matrix/email/..."
"sub-vocal"
" translated foreign language" (Foreign Language)

Volker

  • *
  • Ace Runner
  • ****
  • Posts: 1896
« Reply #467 on: <05-14-16/1104:54> »
"My call is that I need a minute to find out about the architecture before I do something stupid."

bnc excuses herself and walks over to the restroom. On her way, she carefully pays attention for
 a) any physical access to the host there might be (doors, automats, and so on)
 b) who is and who is not allowed to enter the secure area of the host.
"normal speech"
whisper/"under your breath"
thought
"Matrix/email/..."
"sub-vocal"
"foreign language"

Jack_Spade

  • *
  • Prime Runner
  • *****
  • Posts: 6516
« Reply #468 on: <05-14-16/1133:24> »
It takes bnc only a few minutes to find what she is looking for: A small cleaning drone does it's rounds through the ladies rooms, running silent but with its Universal Dataport only shoddily secured.
talk think matrix

To strive, to seek, to find and not to yield
Revenant Kynos Isaint Rex

Volker

  • *
  • Ace Runner
  • ****
  • Posts: 1896
« Reply #469 on: <05-14-16/1224:11> »
bnc checks for marks on her commlink before she closes the door behind her.

"Okay, unless anybody can conjure up a commlink from some high-rank officer in here, I guess I'll do it from her. I'm in the girls', so place anybody stay close to the restroom. I'm going online."

bnc waits until nobody is there, then grabs the drone. She drags it into the toilet and locks herself up. Then she pulls out the cable of her datajack and plugs it in. Once the drone is hijacked, bnc orders the drone's pilot to search for the files the team agreed upon.
"This might take some time. I can't enter the secured part on my own, alas. Take a drink."

I'll just buy hits to hijack the drone, if it's pilot rating is not higher than two.
I'm not sure how the matrix search runs. It should use the host's stats, but I'm not sure whether the hits are restricted to the drone's data processing, or the host's. GM call, I guess.
"normal speech"
whisper/"under your breath"
thought
"Matrix/email/..."
"sub-vocal"
"foreign language"

Jack_Spade

  • *
  • Prime Runner
  • *****
  • Posts: 6516
« Reply #470 on: <05-14-16/1240:02> »
Hacking the drone was indeed child's play, but having the drone search for a file proved to be futile: The simple software of the pilot was neither equipped nor authorized to retrieve any secured files from the host.


The drone does not have the computers skill, Pilot Rating 1, ergo 0 dice for a search check.

bnc can gain three MARKS on the host by marking the drone. After that it doesn't serve any more use.


talk think matrix

To strive, to seek, to find and not to yield
Revenant Kynos Isaint Rex

Volker

  • *
  • Ace Runner
  • ****
  • Posts: 1896
« Reply #471 on: <05-15-16/0505:44> »
Crap. I was hoping for pilot 2 ^^
Well, anyway. I will then go in with my stealth configuration, and Browse:
ASDF = 3 6(7) 5 4 (5)
Encryption
VM: Configurator, Browse
Exploit
Sneak
Stealth

Silent mode, of course

Matrix search: 10d6t5 1
darn. I edge -.-
2 points spent

re-roll: 9d6t5 1

really? ;-(

I'll just roll the first five Opposed rolls. It doesn't look like God's on my side, though:

Evade Detection: 5#15d6t5 2 3 2 5 6

and the rolls for the patrol IC

Matrix Perception: 5#10d6t5 2 3 3 2 3

Am I right to assume that there are not enough silent icons in the restricted area that it would take patrol IC more than half a minute to attempt three rolls?


Damn. This could have worked nicely. Well, in the end, if you want a job to be done, you gotta do it yourself.

"Okay, boys. Take off your shirts - it's getting hot now."
"normal speech"
whisper/"under your breath"
thought
"Matrix/email/..."
"sub-vocal"
"foreign language"

Jack_Spade

  • *
  • Prime Runner
  • *****
  • Posts: 6516
« Reply #472 on: <05-15-16/0733:37> »

Actually, the Patrol IC rolls every  1D6 + 2 Combat Turns
perception for hidden icons
Search Interval: 1d6+2 5
Search Interval: 1d6+2 3
Search Interval: 1d6+2 5

So you are in their for 13 rounds or roughly 39 seconds before the IC notices that there is someone hidden

The file you are after is Not Publicized, so the threshold is 3.
You have 2 successes at the moment
Matrix search: 9d6t5 3 [9d6t5=6, 4, 4, 5, 2, 1, 5, 2, 1]
You have two successes more than you need, reducing the remaining search time to 60 sec(/2(Browse)/4(two extra successes)= 7,5 sec or two and a half rounds
But the Patrol IC now starts to go into combat mode, using INI
Ini 1: 10+4d6 25
25 You already rolled that and evaded
15 You already rolled that and evaded
5 Matrix Perception: 10d6t5 3 vs. Matrix Defense vs. Perception: 15d6t5 3
Evaded

Ini 2: 10+4d6 21
21: Matrix Perception: 10d6t5 2 vs. Matrix Defense vs. Perception: 15d6t5 7
11: Matrix Perception: 10d6t5 4 vs. Matrix Defense vs. Perception: 15d6t5 2 [15d6t5=4, 3, 2, 1, 5, 3, 2, 1, 5, 3, 2, 1, 1, 1, 2] - Found you. Do you want to spend Edge?
1: Warning and activating Countermeasures: Launch Probe IC


Probe IC: Ini 3: 10+4d6 19





bnc started to wander around the host taking the form of an invisible ghost, while the nosy server stalked around the system and poked his long nosed face into compartments at random.
It took bnc nearly 30 seconds to even locate the administration files for the staff. Suddenly she became aware that the waiter icon had stopped going around at random - it began to close in on her position and had started to throw around what looked like flour, trying to outline invisible icons.
Concentrated on her search she couldn't do much more than hope and wait for her search program to finish.
And then the door to her compartment opened and the waiter began to throw flour in her direction...
talk think matrix

To strive, to seek, to find and not to yield
Revenant Kynos Isaint Rex

Volker

  • *
  • Ace Runner
  • ****
  • Posts: 1896
« Reply #473 on: <05-15-16/1147:33> »

I hate to say that, but Matrix Search is not an Extended Test. So I fail the first one, taking 30 seconds, and then spend another 30 seconds for the one I didn't fail.

Thus, there is absolutely no point in trying it any further. I would have to evade 29 more rolls, if you allow the IC to roll again and again without penalty. Normally, it should suffer a cumulative -1 die for every failed hit (which, I think, makes especially sense in situations like this, because otherwise everyone could detect anyone, rl and matrix, if they roll enough rolls). If we play it that way, I spend one edge since it's already down to 6 dice. Otherwise, the IC will detect me automatically, no matter what I roll or do. So I would shut down my deck and accept that I can't defeat patrol IC.
GM call.
"normal speech"
whisper/"under your breath"
thought
"Matrix/email/..."
"sub-vocal"
"foreign language"

Jack_Spade

  • *
  • Prime Runner
  • *****
  • Posts: 6516
« Reply #474 on: <05-15-16/1212:11> »

I don't see why a search test wouldn't be an extended test. I'd allow it.
Likewise an opposed test in a combat situation is practically never a retry situation - which this is.

But of course you can just jack out without much harm done - the system will be in a state of hightened alert for a few hours and you can try again - or go with option B and acquire the commlink of one of the office people.
talk think matrix

To strive, to seek, to find and not to yield
Revenant Kynos Isaint Rex

SgtBoomCloud

  • *
  • Guest
« Reply #475 on: <05-16-16/0740:23> »
After updating the team on the bodyguard, dismissing the low-level adept's skills as low to no threat, Bluebird sipped at her drink. She figured knowing that their security was possibly augmented and that they did employ magic users was enough to keep them on their toes if anything happened. She finally noticed Krestov drinking the same. She grinned. "Not drinking tonight either?" She shifted her posture, figuring she ought to relax, and have some conversation, lest she stand out as being too on guard and alert. "Hopefully we'll get a table soon."

Admittedly she was still nervous, but she trusted bnc and Torrent to alert her if something changed.

If Krestov reacted to the guard information, he did not show it, but gave an affirming confirmation nontheless.  At this stage, our role does not change.  We are here for help if they call for it, nothing more  Giving a smile back to the human next to him, he leaned back in his seat a bit.  "Da.  Drink cause regret, and break of two month clean.  Would not like me if did, hah."  Nodding his head to the tender as their red drinks were served, he lifted his glass and sipped calmly.  "Table is preferable, yes.  More...ahh, what is word...personal, no?"  He shrugged, keeping half an eye towards the restrooms as bnc did her thing.

Volker

  • *
  • Ace Runner
  • ****
  • Posts: 1896
« Reply #476 on: <05-16-16/0800:25> »
Because the rules explicitly state that it is not an Extended test. I assume it is because they want to prevent players to find every information by just accumulating time. But if you want to houserule this, as GM it's your call.
Same goes for Trying Again. I assume the very reason this rule exists is to ensure that it is not impossible to hide. If the IC can just roll and roll and roll again, even the best hacker has no chance at all to escape detection. "Attempted shots, sword swings and punches" are explicitly excepted from this rule, as it wouldn't make sense. I think, it makes a lot of sense to implore this rule on all kind of detection tests. Otherwise, every attempt of sneaking is futile. Again, if this is your call as GM, I accept it that way. Although I have to admit I find it frustrating that then the last possibility to beat patrol IC is closed.


So, did I get the situation right. I lost 30 seconds with my first failed attempt. Then it takes me another 7.5 seconds till I find the file I'm looking for. So I definitely have the location. Half a combat round later, the patrol IC detects me and launches the probe IC, right? That means, that I have one-and-a half combat round to download the file. Is that correct?
If so, I check the file for protection and/or databombs. If something in the situation is different, please clarify.
Sorry to keep this. I'm still a bit unsecure about both the official matrix rules and your houserules, but I give my best to keep up.
"normal speech"
whisper/"under your breath"
thought
"Matrix/email/..."
"sub-vocal"
"foreign language"

Jack_Spade

  • *
  • Prime Runner
  • *****
  • Posts: 6516
« Reply #477 on: <05-16-16/1653:18> »

I started a discussion for the issue with the Patrol IC in the rules thread.
My conclusion so far: A Program designed to search for intruders does not get frustrated or sloppy in its attempts. It keeps looking for intruders relentless and ever vigilant.

For the moment I rule that you can - at least within the confines of a host where you only have to content with a large but limited number of files - make a search an extended test.

My reasoning for the former:
"SUCCESS TESTS Success tests generally occur when a shadowrunner has to use her abilities to accomplish something in a single moment of time. This could involve weaving a car through traffic at high speed, looking for a needle in a haystack, or lifting a heavy object. A Success test (also known as a Simple test) is a matter of rolling up enough hits to meet the threshold for the test, then moving on." p.47 core

"EXTENDED TESTS Rather than taking place in a single moment, some tests take place over time. Maybe you’re taking a few days to learn a new spell or you’re repairing your beat-up Americar and you need to determine how long the job takes." p.48 core

You accumulate data and methodical work through directories - a Matrix Search fits rather the second definition than the first.

And I just noticed, that indeed you have found the file before the Patrol found you: It took 39 seconds to find you, your search took 30 seconds for the first roll and 7.5 seconds for the second.
Which means just as you found the file and did your first Matrix Perception looking for databombs, the Patrol IC noticed a hidden icon
Matrix Perception: 10d6t5 1 [10d6t5=3, 3, 4, 1, 4, 5, 1, 4, 4, 3]
Yes, the file has an R4 databomb attached

You now roll Ini and compare your actions to my ini charts.

Round 1 you stay undetected - so if you can manage to disarm, crack and copy the file within that round you can log out before you are detected.



While Krestov and Bluebird exchanged pleasantries, both noticed a rather angry looking man entering the restaurant from a door marked as privat and making a bee line towards the kitchen. According to the images they had seen, this was no-one else but the owner and master chef Valmont himself.
Whatever had enraged him, it seemed to be important enough that he nearly lost face in front of his guests.

Torrent was able to notice the same thing, but he was able to hear half a sentence he screamed before the kitchen door swung shut again: "Whoever is responsible for..."
talk think matrix

To strive, to seek, to find and not to yield
Revenant Kynos Isaint Rex

Sabato Kuroi

  • *
  • Omae
  • ***
  • Posts: 822
« Reply #478 on: <05-17-16/0459:48> »
"Guys, there's something wrong, the chef is pissed off. Bnc , if you want me to get you one of their comlinks, now's the time to ask."

Agility Boost: 7d6t5 4


Torrent orders another cocktail
« Last Edit: <05-17-16/0511:44> by Sabato Kuroi »

Volker

  • *
  • Ace Runner
  • ****
  • Posts: 1896
« Reply #479 on: <05-17-16/0535:45> »
Thanks. I just joined the discussion.
I load Defuse instead of Exploit, then attack the data bomb.

INI roll: 4d6+10 25


Disarm Data Bomb: 11d6t5 7
I can only use 5 hits due to my limit.

Opposed roll: 8d6t5 1

:D this worked

I assume that it doesn't have both a protection and a data bomb because the file is in use regularly. Also, if I'm wrong this just means the copying process will fail.

I don't have marks on each file in the host only because I have marks on the host, do I?

So I Hack the file with my next action, changing my configuration back to what it was.

Hacking on the Fly: 19d6t5 9
Opposed roll: 12d6t5 4

nice

so I have one action left to copy the file:

Edit File: 17d6t5 7

Opposed roll: 14d6t5 3

Whew.

INI for next round:

INI roll: 4d6+10 23


bnc sweats virtual beads of sweat as the waiter droes closer. She wipes it off the corpulent chef's forehead, which she chose to blend in. Taking a closer look at the recipe book before, bnc finds a small diary look on the book. A ticking look, too. She unloads the soft backless slippers she's wearing and takes out a swiss army knife with a pair of pilers with which she quickly removes the look, then takes the book under her arms.

Loading and unloading programs, there's hardly time to answer Torrent. She has to be fast now. "If you can easily"
« Last Edit: <05-17-16/0546:38> by Volker »
"normal speech"
whisper/"under your breath"
thought
"Matrix/email/..."
"sub-vocal"
"foreign language"

 

SMF spam blocked by CleanTalk