+ All Categories
Home > Documents > ANALYZE BROWSE COMMAND EDIT - pavao.orgEXPLOIT + Hacking + Hacking + Hacking + Hacking Hack on the...

ANALYZE BROWSE COMMAND EDIT - pavao.orgEXPLOIT + Hacking + Hacking + Hacking + Hacking Hack on the...

Date post: 20-Jan-2021
Category:
Upload: others
View: 22 times
Download: 0 times
Share this document with a friend
3
ANALYZE + Computer + Firewall Matrix Perception (Simple Action) Detect Hacking on the Fly attempt or Probing success (no action) COMMON USE Rating Analyze pavao.org/shadowrun v1.4 BROWSE + Data Search Data mining (Extended test, variable threshhold, Complex Action) COMMON USE Rating Browse pavao.org/shadowrun v1.4 COMMAND + (Skill) Control a device remotely via the Matrix. COMMON USE Rating Command pavao.org/shadowrun v1.4 EDIT + Computer + Computer Edit file or device output (Complex Action) Ongoing editing of streaming data (Simple Action each Initiative Phase) COMMON USE Rating Edit pavao.org/shadowrun v1.4 ENCRYPT + Computer Used as a Threshhold (Rating x 2) for Extended Tests Dynamic encryption: Opposed Test vs. Decrypt + Electronic Warfare, each net hit increases decryption threshold. COMMON USE Rating Encrypt pavao.org/shadowrun v1.4 REALITY FILTER + Response Filter sculpting (opposed test vs. System + Response) for +1 or -1 Response in node COMMON USE Rating Reality Filter pavao.org/shadowrun v1.4 SCAN + Electronic Warfare + Electronic Warfare + Electronic Warfare + Data Search Find node in crowded area (variable, 1 Combat Turn) Find known hidden node (4) (Complex action) Find unknown hidden node (15+) (Complex action) Find a specific node among known nodes in an area. COMMON USE Rating Scan pavao.org/shadowrun v1.4 ARMOR + System Resist Matrix damage. HACKING Rating Armor pavao.org/shadowrun v1.4
Transcript
Page 1: ANALYZE BROWSE COMMAND EDIT - pavao.orgEXPLOIT + Hacking + Hacking + Hacking + Hacking Hack on the fly with a Complex Action and Extended Test (Firewall, 1 Initiative Pass) Probe target

ANALYZE

+ Computer

+ Firewall

Matrix Perception (Simple Action)

Detect Hacking on the Fly attempt or Probingsuccess (no action)

COMMON USE

RatingAnalyze

pavao.org/shadowrunv1.4

BROWSE

+ Data Search Data mining (Extended test, variable threshhold,Complex Action)

COMMON USE

RatingBrowse

pavao.org/shadowrunv1.4

COMMAND

+ (Skill) Control a device remotely via the Matrix.

COMMON USE

RatingCommand

pavao.org/shadowrunv1.4

EDIT

+ Computer

+ Computer

Edit file or device output (Complex Action)

Ongoing editing of streaming data (Simple Actioneach Initiative Phase)

COMMON USE

RatingEdit

pavao.org/shadowrunv1.4

ENCRYPT

+ Computer

Used as a Threshhold (Rating x 2) for ExtendedTests

Dynamic encryption: Opposed Test vs. Decrypt +Electronic Warfare, each net hit increasesdecryption threshold.

COMMON USE

RatingEncrypt

pavao.org/shadowrunv1.4

REALITY FILTER

+ Response Filter sculpting (opposed test vs. System +Response) for +1 or -1 Response in node

COMMON USE

RatingReality Filter

pavao.org/shadowrunv1.4

SCAN

+ ElectronicWarfare

+ ElectronicWarfare

+ ElectronicWarfare

+ Data Search

Find node in crowded area (variable, 1 CombatTurn)

Find known hidden node (4) (Complex action)

Find unknown hidden node (15+) (Complexaction)

Find a specific node among known nodes in anarea.

COMMON USE

RatingScan

pavao.org/shadowrunv1.4

ARMOR

+ System Resist Matrix damage.

HACKING

RatingArmor

pavao.org/shadowrunv1.4

Page 2: ANALYZE BROWSE COMMAND EDIT - pavao.orgEXPLOIT + Hacking + Hacking + Hacking + Hacking Hack on the fly with a Complex Action and Extended Test (Firewall, 1 Initiative Pass) Probe target

ATTACK

+ Cybercombat

+ Rating

Make an attack on an entity in the same node(Opposed with Response + Firewall)

Agent/IC/sprite attack.

HACKING

RatingAttack

pavao.org/shadowrunv1.4

BIOFEEDBACK FILTER

+ Willpower

+ Willpower

+ Willpower

+ Willpower

Resist damage from black IC programs

Resist damage from dumpshock

Escape black IC with an Opposed Test vs ICRating + Response

Resist damage from being jumped into a drone orvehicle that takes damage

HACKING

RatingBiofeedback Filter

pavao.org/shadowrunv1.4

BLACK HAMMER

+ Cybercombat Attack VR user (Opposed Test vs Response +Stealth) and jam connection open

Causes Physical damage to hot-sim users, Stundamage to cold-sim users.

HACKING

RatingBlack Hammer

pavao.org/shadowrunv1.4

BLACKOUT

+ Cybercombat Attack VR user (Opposed Test vs Response +Stealth) and jam connection open

Causes Stun damage to VR users.

HACKING

RatingBlackout

pavao.org/shadowrunv1.4

DATA BOMB

Attach a data bomb to a file or node (p. 231,SR4A)

A data bomb inflicts a number of boxes of Matrixdamage equal to (1D6) x Rating when activated

HACKING

RatingData Bomb

pavao.org/shadowrunv1.4

DECRYPT

+ ElectronicWarfare

Break encryption with Extended Test (Encryptionrating x 2, Complex Action)

After the first Complex Action, this program takesover for the user, using her Electronic Warfare

HACKING

RatingDecrypt

pavao.org/shadowrunv1.4

DEFUSE

+ Hacking Disarm a data bomb with an Opposed Test vs(Data Bomb rating x 2)

Failure activates the data bomb.

HACKING

RatingDefuse

pavao.org/shadowrunv1.4

ECCM

Adds rating to Signal when defending againstjamming

Adds rating to dice pool when defending againstjamming on the fly

HACKING

RatingECCM

pavao.org/shadowrunv1.4

Page 3: ANALYZE BROWSE COMMAND EDIT - pavao.orgEXPLOIT + Hacking + Hacking + Hacking + Hacking Hack on the fly with a Complex Action and Extended Test (Firewall, 1 Initiative Pass) Probe target

EXPLOIT

+ Hacking

+ Hacking

+ Hacking

+ Hacking

Hack on the fly with a Complex Action andExtended Test (Firewall, 1 Initiative Pass)

Probe target with Extended Test (System +Firewall, 1 hour in VR or 1 day in AR)

Crash a program with Opposed Test vs. Firewall +System (Complex Action)

Crash a node with an Extended Test (Firewall +System, Complex Action)

HACKING

RatingExploit

pavao.org/shadowrunv1.4

MEDIC

+ Computer Repair all Matrix damage to an icon, Extended Test(damage taken x 2, Complex Action)

HACKING

RatingMedic

pavao.org/shadowrunv1.4

SNIFFER

+ Hacking

+ Hacking

+ ElectronicWarfare

+ Data Search

Intercept traffic from a hacked node, hits areThreshhold for detection (Complex Action)

Insert fake traffic from hacked node, Opposed Testvs System + Firewall (Complex Action)

Capture wireless signals, Threshhold 3

Find a particular piece of information in a capturedwireless stream

HACKING

RatingSniffer

pavao.org/shadowrunv1.4

SPOOF

+ Hacking

+ Hacking

+ Hacking

Spoof commlink's access ID, threshhold 2,

Redirect active trace with Opposed Test vsComputer + Track, net hits increase threshold

Spoof a command to a device with Opposed Test vsPilot + Firewall or System + Firewall

HACKING

RatingSpoof

pavao.org/shadowrunv1.4

STEALTH

+ Hacking

+ Firewall

Threshhold for discovery in hacking attempts

Icon opposes Matrix perception tests.

Node opposes Matrix perception tests.

Rating is dice pool penalty to trace attempts.

HACKING

RatingStealth

pavao.org/shadowrunv1.4

TRACK

+ Computer Find originating node location with Extended Test(10, Complex Action).

Wired nodes are located, wireless located to within50 meters, may monitor movement.

HACKING

RatingTrack

pavao.org/shadowrunv1.4


Recommended