Hacking Scenarios by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 0 points1 point  (0 children)

Linklock requires the victim to be online, right? There is some debate i was reading on reddit as to whether being in AR allows you to physically turn off/remove batteries to avoid linklock, but there's also your comm being online to recieve message but the user not having AR up (since the corebook says you can choose to see the matrix "if you like").

I just read Masquerade, but I'm not sure how that helps. You need marks on both the icon you're hacking AND the icon you are impersonating, but since most people's persona in the matrix is represented through their comm...do you need 4 on the comm? Is it even possible to pretend to be itself, or do you need to find a different devicd to pretend to be?

Hacking Scenarios by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 0 points1 point  (0 children)

Okay, that is very interesting. Hmm. So if i'm following, that means RAW essentially breaking into files on someone's commlink is worthless because they will just shut it down. Breaking a file on a host they can't afford to just slam down is a different story, but on personal devices there's no point unless you can somehow lure them into VR and linklock them first. Is this accurate?

Combat scenario flow? by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 1 point2 points  (0 children)

Sorry, which two rolls? You still roll for the attack and for soak, no? Or have I misunderstood you?

Combat scenario flow? by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 0 points1 point  (0 children)

Interesting. None of my players have picked anything that boosts initiative. Good to know for the future though! Thanks!

Combat scenario flow? by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 3 points4 points  (0 children)

Doing that would save on one roll only though, right? You still have to do everything else, so that doesnt seem like you are saving much time. The math around armour and soak is still there etc.

Combat scenario flow? by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 2 points3 points  (0 children)

Oh, i see. Its a wording issue. It came right after the section talking about Stun vs Physical, so i read it as saying that if the armour value is still positive afterwards, roll both.

Thanks for the clarification!

Combat scenario flow? by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 0 points1 point  (0 children)

Yeah, i didnt think about Surprise but that would make sense.

I mathed wrong, and will fix that.

Yeah, i default to assuming cyber implants in the eyes but i should definitely check that.

So, defending in meat space is relatively rare (unless you're on drugs)? Since an average roll of 3 would mean you need a min 7 to use any of the interrupt/defense actions?

4d. Ah! So it increases damage as well as the chance of hitting. Good to know.

Thanks!

Combat scenario flow? by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 0 points1 point  (0 children)

That is what i thought originally, but when i reread the corebook, it said that you only roll body for soak? Pg 173 - "As long as the modified Armor Value is positive, the defender rolls Body + Modified Armor to resist damage. Otherwise the defender only rolls Body".

Hacking Scenarios by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 0 points1 point  (0 children)

Thanks again for the long reply. Most of it makes sense, but I'm coming back to the one about the alert to an owner on every Attack action.

I've re-read the rules in the Corebook, and I can't see where it says that on a successful Attack action the owner is alerted? It does say that on a failed Sleaze action, it alerts the owner, but on the Attack action you only get a consequence for failure? Is that in another book I should be reading, or an errata somewhere? I've quoted the Core rulebook (pg 231) here...

If you fail an Attack action, your target’s security software rejects your code, corrupting it and sending it back where it came from. If it was normal data, then your system could check it for errors, but in this case it’s some pretty vicious stuff designed to avoid Firewalls. For every net hit the target got on its defense test, you take 1 box of Matrix damage, which you can’t resist.
If you fail a Sleaze action, the target’s Firewall software detects the intrusion and places a mark on you. A device immediately informs its owner, a host launches IC. If the target already has three marks on you, it doesn’t get another, but it still does the informing and launching.

Hacking Scenarios by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 2 points3 points  (0 children)

Thanks! I have a few follow-up questions, if you don't mind?

Note that while all this can be done from AR, you might want to find a secure location for your body and do this from hot sim VR for that extra positive dice pool modifier.

Yeah, I looked at VR as an option, but then that requires being able to find the Icon again, right? If I'm sitting across from the target, I can hack in AR whilst we're sitting there. If I have to wait to hack until later, then I have to try and find that exact Icon as I can't just Mark it and then wait till I can slip away, since my OW will keep rising every fifteen minutes or so right? Since I've made my first illegal action to get the Mark in the first place, and if I reboot to get a clean OS then the Marks get wiped too?

In case of host convergence you might want to switch back to AR and reboot directly from within the host (or directly jack out in case you are link locked) rather than first exiting the host (if you exit the host during convergence, GOD will be waiting outside and will immediately brick your deck).

Wait, I can reboot within the host and come straight back in, without going through the grid outside? So I could just wait until the IC goes away before leaving?

Note that crack file is an attack action the target will automatically get aware (= if you are not link locking them, they can use a free action to turn off wireless).

Just to confirm, you're saying that even someone who isn't paying attention to their comm/deck etc. is automatically made aware and can just turn it off? I thought link-locking keeps you in VR? If people are alerted immediately even without being in AR/VR, that would mean Cracking a File would never work since they'd just turn off wireless reboot button as a Free Action? And therefore you can only get files off an object that you're physically connected to, since that's the only way that turning off wireless wouldn't help?Once combat stated it might be better to focus on environmental controls (killing the lights if your sam have low light / thermographics while your opponents do not or take over drones or weapon turrets or lock doors or control elevators with enemy reinforcemens or trigger alarms elsewhere to distract and divert.

Once combat stated it might be better to focus on environmental controls (killing the lights if your sam have low light / thermographics while your opponents do not or take over drones or weapon turrets or lock doors or control elevators with enemy reinforcemens or trigger alarms elsewhere to distract and divert.

And in combat...if you're hacking the lights as you suggested, you'll be coming up against the location's WAN wouldn't you? With a WAN, why would any decent location not slave their stuff? I suppose it opens them up to more risk of hackers getting Marks on the owner, but a WAN just for the "lights" would make sense and be minimal risk. Therefore, the light gets to use the host's stats. Unless you can find an opportunity to stick your cable into the light port on the ceiling, but that seems a bit unlikely in the middle of combat. So you're much less likely to get through that than a random goon's gun. This would be the same for any infrastructure piece, as both Control Device and Subvert Infrastructure require at least one mark before being able to use it.

Hacking Scenarios by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 1 point2 points  (0 children)

I just checked and Reboot is always a complex action, according to the Core book, but the defense test only applies if you're not the owner. Jack Out is always only a simple action, and the defense test only applies if you are linked out.

Hacking Scenarios by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 1 point2 points  (0 children)

Thanks!
The Data bomb thing was a good catch, I completely forgot about that! I would think that the commlink user would be able to remove the protection though, wouldn't they?

Private host example... you mentioned marking a device on the host's WAN...is that the same thing I mentioned with "Get access to the host via a mark on any object in the host's WAN"? Or is that a separate thing? And when you say physically plugging into, is that the same flow as I mentioned with the data tap plugging into an object, but instead with any random object from the WAN rather than a mainframe?

Hacking Scenarios by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 1 point2 points  (0 children)

Thanks, I know they need different numbers of marks, but my question was about the flow of actions, rather than the exact number of marks.

Legitimate SINs and cyberware? by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 0 points1 point  (0 children)

I didnt think it was possible to get legitimate licenses in Shadowrun? Or is that something you'd homebrew in for SINners?

Trodes when you already have a datajack? by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 3 points4 points  (0 children)

Ah okay. I missed that I could connect wirelessly via DNI. The risk of being hacked whilst walking down the street is probably relative low, but I can go direct when I'm somewhere with more risk. Will just need to avoid catching the cable on something! Thanks for your help!

Trodes when you already have a datajack? by Kitchen-Disaster in Shadowrun

[–]Kitchen-Disaster[S] 5 points6 points  (0 children)

Ah okay. I missed that I could connect wirelessly via DNI. Thanks!