"Right then, give me a moment. If I start bleeding from my eyes or something, don't worry - that happens sometimes when we push past the normal limits of our abilities." Fionn dropped into VR and went to work. He had committed a cloak to his living persona that helped him evade detection that was as powerful as he could permanently have it, but wanted to make it more powerful to be on the safe side; similarly, he had another in the form of a set of old school lockpicking tools that could do to be stronger. So he reached out into the Resonance to gather the threads he needed, but for this task he needed some truly strong ones. Somewhere in his mind, at the seat of his abilities, he felt a sensation not unlike a muscle being pushed just a little past it's usual limits. Nothing too terribly difficult to endure, but he had a feeling it could have been a good deal worse had he made a mistake. In the end, he had a cloak and cowl that wrapped him in some sort of fae mist, rendering him nigh-impossible to detect, and his lockpicking tools had transformed themselves into a pikey, which would allow him to bypass the firewall with ease.
That work completed, he found himself before the firewall, which appeared to him as an iron gate. He slipped the key into the lock, turned it, and the gate came open. Like a thief in the night he stole in, and set his sights on the security of the node. He let the key construct lapse back to its original form and reached out for some different threads. This time he had some difficulty finding the threads he needed, but that was not a major problem as he had plenty of time to work with. Once he found what he needed, he put together a small trap disarming kit. That in hand, he found the center of the node's Analyze program, which took the form of a network of security cameras wired to a central panel, and set a bypass in place to loop the cameras. Satisfied that the program could no longer be used against him, he called in the fox-sidhe.
"I need you to find the access log of this node and the security credentials it is using to access the node it is subscribed to, and I need you to do it quietly.""It shall be done, then." The sprite simply seemed bored, but returned with the information he needed all the same.
Once the sprite returned with the information he needed, he let his disarming tools vanish, and crafted a brush and whitewashed the access log.
"And if you would get me his access ID, we'll be ready to go." The sprite provided it in a moment; it seemed please to burn through the tasks it owed this quickly. With that in his possession, he let the brush fade away and wove together a mask, wiped away his Matrix signature, and used the Access ID to mimic the security supervisor - severing his connection to the guy's commlink instantly, but he didn't need that anymore. Access ID and credentials ready, he moved back into augmented space.
"And that's my prepwork done. I'll have just a little bit to do when we've started up; who's coordination are we running on?"
Stealth Threading Test (8d6.hits(5)=3)
Stealth Threaded to Rating 8
Fading Resistance, DV 3P (12d6.hits(5)=5)
Fading is Physical because the final Rating exceeds Fionn's Resonance, but is fully resisted.
Exploit Theading Test (6d6.hits(5)=4)
Exploit Threaded to Rating 8
Fading Resistance Test, DV 4P (12d6.hits(5)=3)
Damage only partially resisted, Fionn suffers 1P damage.
Hack On the Fly on security supervisor's commlink, aiming for User access (Hacking 4 + Threaded Exploit 8 + VR 2 - Stealth Sustaining 2, Extended Test interval 1 Complex Action, threshold target's Firewall) (12d6.hits(5)=3)
Fionn gets access in one Complex Action. The node gets one Firewall+Analyze roll against his Stealth rating to detect him, but at System and Firewall 3 I don't think that's much of a concern.
Disarm Threading Test (6d6.hits(5)=0)
No hits generated, attempt is discarded. Without using any hits, there's no Fading to deal with.
Disarm Threading Test (6d6.hits(5)=1)
Only one hit generated, attempt is discarded (with threading, you get to choose how many hits to use, so rolls like this can be ignored). Roll is glitched, waiting to know how bad the result of the glitch before deciding to spend 2 Edge to downgrade it (as this isn't a hacking action, setting off the alert seems inappropriate; perhaps increasing the Fading DV and/or converting it to physical, or inflicting from mandatory Fading?). Again, as no hits are used, no Fading to cope with.
Disarm Threading Test (6d6.hits(5)=4)
Disarm threaded to Rating 4.
Fading Resistance Test, DV 4S (12d6.hits(5)=7)
Fading fully resisted.
Disarm Extended Test, threshold Firewall+System, interval 1 Initiative Pass (8d6.hits(5)=4, 8d6.hits(5)=4, 8d6.hits(5)=1)
Threshold achieved on second roll. The system's Analyze program is now completely ineffective against me.
Data Search of node (interval 1 Complex Action) to find access log. (10d6.hits(5)=2, 10d6.hits(5)=4, 10d6.hits(5)=3)
9 hits generated to find the Access Log. Sufficient?
Data Search of node (interval 1 Complex Action) to find security credentials. (10d6.hits(5)=4, 10d6.hits(5)=5, 10d6.hits(5)=3)
12 hits generated to find Security Credentials. Sufficient?
Edit Threading test (6d6.hits(5)=3)
Fading Resistance, DV3S (12d6.hits(5)=4)
Hacking+Edit to alter the Access Log, removing all trace of his activities. (7d6.hits(5)=1)
Spoof Threading Test (6d6.hits(5)=2)
Matrix Perception Test to get Access ID (10d6.hits(5)=5)
Spoof attempt to mimic the security supervisor's Access ID (6d6.hits(6)=2)