NEWS

[OOC] Missions 2 - Tunnel Vision

  • 1352 Replies
  • 361275 Views

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #615 on: <01-05-12/0911:37> »
or since you delayed, you might even go after the drones in the previous pass
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Netzgeist

  • *
  • Ace Runner
  • ****
  • Posts: 1556
  • Serpens, nisi serpentem comederit, non fit draco
« Reply #616 on: <01-05-12/0941:59> »
That's what I'll do; better to save this second pass action to hacking.

snake_eyes

  • *
  • Omae
  • ***
  • Posts: 445
« Reply #617 on: <01-05-12/1011:42> »
Mouse's Complex Forms
Common
Analyze 5
Browse 3
Command 2
Edit 3
Scan 3

Hacking
Armor 5
Attack 5
Decrypt 3
Defuse 1
Exploit 5 (10 threaded)
Spoof 2
Stealth 5
Track 5
 I'll post Sprite Init and it will start disarming the databomb on the main security node

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #618 on: <01-05-12/1015:04> »
I'll post Sprite Init and it will start disarming the databomb on the main security node

There is no bomb on main security node.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

snake_eyes

  • *
  • Omae
  • ***
  • Posts: 445
« Reply #619 on: <01-05-12/1028:31> »
Updated post to the first drone node.
« Last Edit: <01-05-12/1033:49> by snake_eyes »

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #620 on: <01-05-12/1143:31> »
BTW Decrypt is linked to Electronic Warfare skill
I know you hate me :P
I also hate myself because it takes interval 1 CT, not 1 IP as I failed to remember. I know now :-X

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #621 on: <01-05-12/1145:45> »
Does it mean you do nothing for the next 6 IP?
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #622 on: <01-05-12/1208:54> »
6IP?
Updated my post, but 6IP is quite enought :P :) well there is nothing I can do...maybe run another decryption in 3rd. IP working on one of those nodes.

Netzgeist

  • *
  • Ace Runner
  • ****
  • Posts: 1556
  • Serpens, nisi serpentem comederit, non fit draco
« Reply #623 on: <01-05-12/1435:46> »
In order for you not needing to wait for me on my turn: since there's nothing more that is possible to do right now, Fractal will spend a simple action turning his encrypt program off (so that, if next IP there's still no decrypted node, at least he can run his Spoof 6 without losing Response.

snake_eyes

  • *
  • Omae
  • ***
  • Posts: 445
« Reply #624 on: <01-06-12/0649:58> »
BTW Decrypt is linked to Electronic Warfare skill
I know you hate me :P
I also hate myself because it takes interval 1 CT, not 1 IP as I failed to remember. I know now :-X
This is from the SR4 p225 pdf that I have (its an older one, not the anniversary edition.) So the newer version may have changed that. The roll sounded odd to me as well.
Quote
Encryption and Decryption Files, signals, and devices may all be encrypted with a Simple Action . If you have the proper key, decrypting takes only a Simple Action. Without a key, you must employ a bat-tery of advanced sampling, pattern-matching, and brute-force attacks to bypass the encryption. Make a Decrypt + Response (Encryption rating x 2, 1 Combat T urn) Extended T est to break the encryption.

Sent: which way should it be?
« Last Edit: <01-06-12/0655:08> by snake_eyes »

snake_eyes

  • *
  • Omae
  • ***
  • Posts: 445
« Reply #625 on: <01-06-12/0658:43> »
Does each node have to be decrypted individually? or when the master node is decrypted, we have the remaining slaves decrypted?

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #626 on: <01-06-12/0700:16> »
well, I can imagine the situation that once Main node is decrypted and sucesfully hacked for admin privileges, It would take a free or simple action to turn off encrpytion programs running in any node in the network.

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #627 on: <01-06-12/0703:58> »
well, I can imagine the situation that once Main node is decrypted and sucesfully hacked for admin privileges, It would take a free or simple action to turn off encrpytion programs running in any node in the network.

or, maybe, sucessfully spoofed would be enought

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #628 on: <01-06-12/0728:01> »
Sent: which way should it be?

Quote
In itiate Cryptanalysis (Decrypt)
You have your Decrypt program start working on an encryption to
which you have access. Cryptanalysis is an Electronic Warfare +
Decrypt (encryption rating x 2, 1 Combat Turn) Extended Test
. When
you reach the threshold, the encryption is broken. When you break the
encryption of a file, the file becomes decrypted. When you use this on
a node, you may access that node, but it remains encrypted to others.
Once you have initiated cryptanalysis, your Decrypt program
takes over and runs autonomously, using your Electronic Warfare skill
rating. A running Decrypt program can only work on one encryption
at a time, but multiple Decrypt programs can work on different
encryptions simultaneously; each Decrypt program makes its own
Extended Test and cannot collaborate with other programs
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #629 on: <01-06-12/0750:34> »
Does each node have to be decrypted individually? or when the master node is decrypted, we have the remaining slaves decrypted?

If you crack the main security node, you will find the encryption keys of the drone nodes. You may crack the encryption to get them without doing so. Cracking the encryption is requried to get access on any type of privileges.

To spoof commands you need to decrypt the encrypted line, as thi sis the only way the drone is accepting commands.

Now the drone nodes are identical, but it is improbable anyone would use identical encryption keys.  So the short answer is that yes, each of the nodes must be cracked individually.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

 

SMF spam blocked by CleanTalk