While Mouse tends to focus more on stealth than brute force, after observing how "old school" goes in and just starts pounding on applications run by IC and nodes, Mouse says to hizself, "Interesting tactic. Let's give it a try and see how it works."
Upon entering the node of the guard's com link as public user, he checks for the typical security measures (analyze programs, IC, personas, agents, etc.)
Matrix Perception: computer(4)+analyze(5)+2tm-2sus ->
9d6.hits(5)=3If I find a node analyze program, I'll crash that:
hacking(4)+exploit(5)+2tm-2sustaining ->
9d6.hits(5)=1Otherwise...I start hacking admin account:
hacking(4)+exploit(5)+2tm-2sus->
9d6.hits(5)=4