0% found this document useful (0 votes)
66 views

Hacking

This document outlines common hacking actions and how to execute a hack against computer systems at different technology levels. It describes how to answer specific questions, get general information, acquire entire databases, suppress or subvert connected systems, and sabotage systems. The difficulty of different hacking actions and modifiers based on circumstances, multiple attempts, and type of system hacked are provided. Line shunts may be required for long-running or high-security hacks to bypass normal network protocols. Failing a hack risks alerting the system and trace of the hacker's location.

Uploaded by

Patrick Helm
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

Hacking

This document outlines common hacking actions and how to execute a hack against computer systems at different technology levels. It describes how to answer specific questions, get general information, acquire entire databases, suppress or subvert connected systems, and sabotage systems. The difficulty of different hacking actions and modifiers based on circumstances, multiple attempts, and type of system hacked are provided. Line shunts may be required for long-running or high-security hacks to bypass normal network protocols. Failing a hack risks alerting the system and trace of the hacker's location.

Uploaded by

Patrick Helm
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Breaking Without Entering

Access denied

The Digital Environment Common Hacking Actions


Most TL4 or higher planets will rely to some degree on Answer a Specific Question retrieve a specific fact or
computers. An internet-like global network may or may information stored on the system such as specific personal
not exist depending on political and cultural values but information, virtual and physical locations, locations of
most organizations and buildings will at least have security cameras, or other general information to be found

some kind of data storage and local network

Get General Information pull all available info on a


Executing a Hack particular topic such as a complete map of location, all
Most hacking requires a physical interface with the system security system data, complete personal records, all files for
either by tapping a line with a metatool (takes 1 min unless a secret project

special cable-siphon tool used) or by plugging into a


terminal connection (Main Action)
Complete Database Acquisition copy an entire database to
another computer or storage system or sufficient size.
Hack make INT/Program skill check vs DC. This takes 10 Database must be entirely contained in target system and it
min to perform on-the-fly or a Main Action if hacker has takes 1 hour to decrypt and download (1 Line Shunt)

spent an hour preparing the hack. If rushed, an off-the-cuff


hack can be attempted as a Main Action against a higher DC Suppress a System shut down a connected system of like
Repeated hacking activities become riskier with an additional elements such as security cameras, sensors, automated gun
+1 to DC for every attempt within 24 hours
turrets. Systems resume as before after hack ends

Line Shunts Subvert a System control a connected system within the


Long-running hacks as well as ones made against well- devices’ normal parameters. Fake data can be used to fool
guarded and high-security computer systems may require sensors, doors can be opened and weapons fired. A hacker
Line Shunts (TL4 black-market tech) to be placed at specific can use their Main Action to maintain control each round,
locations to spoof normal network state. The correct tapping otherwise the system simply repeats last state

locations can be determined from a network map or by a


successful Answer a Specific Question hack. Long-running Sabotage a System completely damage a specific system
hacks can run as long as the shunts remain in place such that it physically self-destructs or becomes jammed
(detection depends on nature of location). Corporate with malignant code. Damage is permanent until repaired.
systems take 1 shunt, Government systems take 2 shunts Sabotage always trigger immediate alerts to overseers

and Black Sites or TL5 systems take 3 shunts


Common Hacking Action DC
Failing a Hack Answer a Specific Question 8

On failing a hack, hacker must immediately make a second Get General Information 10

Hack check vs original DC. On success, they avoid alarm Complete Database Acquisition 12

and location trace. On failure, the system is alerted to the Suppress a System 8

hacker and reports to any overseer. The result of this Subvert a System 10

depends on the nature of the organization under attack Sabotage a System 10

Exploiting the Hack Hacking Circumstances Mod


With a successful hack, a hacker gets what they are after. If it Overseers are alarmed +1

is data, then the data is instantly downloaded. If it is control Rushed, unplanned hack +2

of an automated system, then control is maintained for 1d4 Each hack after first +1

rounds + Program skill level before detection and lock out


Especially sensitive system +1

Types of Systems Mod


Ordinary personal system -1

Small business system +0

Major corp/Minor Government +1

Mega corp/Major Government +2

You might also like