NEWS

[OOC] Missions 2 - Rising Sin

  • 1181 Replies
  • 273101 Views

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!

Re:

« Reply #1065 on: <03-20-13/0616:39> »
Right. Im currious how he woul proceed.

Xzylvador

  • *
  • Prime Runner
  • *****
  • Posts: 3666
  • Ask me about NERPS! 30% Sales!
« Reply #1066 on: <03-20-13/0916:20> »
Seriously, what the hell is in those packages anyway?

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!

Re:

« Reply #1067 on: <03-20-13/0929:59> »
@Bittersnake is mostly described in IC. + tacnet client, network settings etc. @Silk is complete list of team contacts, so she can arrange her agenda, tacnet client, network settings and personal file for Farothels character, so Silk can contact her and fill the blind spot in data mouse revealed via matrix: her motivation to quit KE despites perfect career and to became runner.

snake_eyes

  • *
  • Omae
  • ***
  • Posts: 445
« Reply #1068 on: <03-20-13/1859:53> »
Sent: before I roll, I earlier asked a question about using agents. I planned to set up my alternate commlink with a small bonnet to use to assist in hacking. I know an agent or sprite can add +1 die to the roll. I was wondering if 4 agents (r4) would be able to add up to 4die for the hacking attempt? It's based on the strategy that Mouse used earlier as part of this previous adventure.

Sorry guys, this has been a really busy week.

Oh. I looked at the program options: I added Mute to exploit and Area (+2) and Targeting to attack.
« Last Edit: <03-20-13/1904:42> by snake_eyes »

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #1069 on: <03-21-13/0628:57> »
Im back in the bed for a difference. Two days in the work and the fever is back :(
@Snake_eyes: Take your time...beter to practice now than later during real mission. And dont push yourself over the edge...no shame ta stand back if node is secure enought. Thats what probing is for :)
« Last Edit: <03-21-13/0653:00> by Sichr »

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #1070 on: <03-21-13/0642:22> »
Quote
If a hacker is using mass probing to place bots, accounts
lost to security upgrades and system audits will usually remove
the bots as well. A botnet can also assist a hacker in performing
a mass probe; add a 1 die positive modifier to the hacker’s Mass
Probing Test
for every bot in the botnet carrying an Exploit
program, up to a maximum bonus equal to the character’s
Hacking skill.

the problem is that probing even in VR takes 1 hour minimum
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #1071 on: <03-21-13/0643:50> »
but if you go for hack on the fly, you can use them as well:

Quote
Mass Attacks
A mass attack refers to a team of hackers pooling their resources
to hack a particular system. Functionally, a mass attack
is Probing the Target (see Probing the Target, p. 221, SR4) with a
Teamwork Test. Hackers and technomancers can work together
on mass attacks. If the test is successful, all of the participating
hackers gain access to the node.
Agents and sprites cannot participate directly in Teamwork
Tests, but add +1 die to the prime character’s dice pool for each
agent or sprite assisting (maximum +5).
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #1072 on: <03-21-13/0707:01> »
as i read it: "Functionally, a mass attackis Probing the Target..." means this also cannot be made on fly...

snake_eyes

  • *
  • Omae
  • ***
  • Posts: 445
« Reply #1073 on: <03-21-13/1857:32> »
While not in a hurry, technically. I don't think the conversation is going to last an hour. Not with Omar leading the conversation, anyway.

So the intent was to hack on the fly. Mouse would start with the rating 3 firewall. Which he should be capable of accomplishing w/o incident. The firewall rating 6 potentially has the ability to be more problematic for him.

Sent: I will leave the decision up to you re: +4 from the agents with a hack on the fly.

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #1074 on: <03-21-13/1928:57> »
until further notice, we'll play with: +1 per agents apply only to probing attack.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Sentinemodo

  • *
  • Prime Runner
  • *****
  • Posts: 4498
  • Prepare for the worst - surprises will be pleasant
« Reply #1075 on: <03-22-13/0327:49> »
Snake, what is your stealth rating?
I assume it's basic one so it is treshold 5.
Netz, will you please roll two times your Firewall + Analyze?

Snake I assume, you want to have mute option on. This mean you cannot autobuy fade resist on 3P (one net hit is used for option) - so you either have exploit 6 with mute on autobuy or you roll fade resist for 3 net hits.
Sorry for a small delay ;)

Denver Missions
concluded 01 02 03 04 05 10 09 11
running 13
runners: Caretaker Jerry

Netzgeist

  • *
  • Ace Runner
  • ****
  • Posts: 1556
  • Serpens, nisi serpentem comederit, non fit draco
« Reply #1076 on: <03-22-13/0529:52> »

Netz, will you please roll two times your Firewall + Analyze?


Done.

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #1077 on: <03-22-13/0607:51> »
I know Sent calculated the thresshold here in OOC nad you go with that, Snake, but can anyone explain to me why you are hacking for admin account? To plant files User level is comfortably enought, and even security would be enoughht to manage alerts etc. Why do you go for +6 thresshold when you dont have any use for admin rights ???

Xzylvador

  • *
  • Prime Runner
  • *****
  • Posts: 3666
  • Ask me about NERPS! 30% Sales!
« Reply #1078 on: <03-22-13/0637:40> »
Not too sure if every system automatically has these difference kinds of accounts.
Sure, the node of a corporate site will have these, but a single-user commink?
I know my cell-phone only has an admin account, no others.

If not, I'd agree on user -usually- being high enough to write a file... but it's up to the admin to set these restrictions; for a single-user device I'd think it makes sense to for the admin-user disallow anything that's not your own level.
Security accounts shutting down security is a big no-no, even for corporate accounts imo. They can call in IC, kick/temp-block user-level accounts and maybe manage some smaller settings and shut down low-level operations to make sure the security programs get priority, but actually disabling security on a node should definately be a admin-only right.

Sichr

  • *
  • Prime Runner
  • *****
  • Posts: 7202
  • TOTÁLNÍ FAŠÍRKA ZMRDI !!!
« Reply #1079 on: <03-22-13/0646:46> »
Quote from: SRA, p. 225
ACCESSACCOUNTS
When you log on to a node, you do so at a certain access level, which is
defined by your account.There are four types of accounts, public, user,
security,and admin,in order of least to most access. Except for public
accounts, access to an account level requires authorization, which is
described in the next section, Authorization and Authentication.

A public account is a sort of “foyer” for a node. When logging
on without any authentication, you get a public account. Public ac-counts usually allow the user to access public information about the
node, and could also allow a small amount of functionality, like the
ability to order food, shop, fill out forms, etc., depending on the node’s
purpose. Most retail outlets, malls, restaurants, and other nodes open
to the public offer this account to customers.

A user account is offered to users who belong in the node, like
the employees of a company or paid customers of a Matrix nightclub.
Icons with this account are generally allowed to run programs, create
and edit files, and perform the usual work of the node (whatever that
may be), depending on the function of the node. User accounts require
some form of authorization to access.

A security account is for users who are responsible for safeguard-ing the node. These users are allowed the privileges of user access, plus
the ability to delete files, run IC, log off users, and initiate alerts. The
threshold for hacking a security account is increased by +3.

An admin(short for administrator) account grants a user full
access to the node. No action or command is denied to an admin ac-count. Most nodes only offer this account to a few users, or only one.
The threshold for hacking an admin account is increased by +6.
Peripheral nodes are simple constructs and only have public and
admin access. The hacking threshold increase for admin access does
not apply to peripheral nodes