0% found this document useful (0 votes)
115 views6 pages

Analyze Browse Command Edit: Common Use Common Use Common Use Common Use

Attack programs allow hackers to target other agents in the Matrix through various exploits and vulnerabilities. To use an Attack program requires a Complex Action and an Opposed Test between the user's Response + Firewall + Cybercombat skill versus the target's Response. Any net hits scored reduce the target's Response and Firewall ratings. Biofeedback Filter programs help resist mental intrusions and hacking attempts that target a user's persona. Damage from Black IC attacks is resisted with a test of Willpower + Biofeedback Filter. Black Hammer programs stealthily infiltrate other agents and systems without detection. To use a Black Hammer requires an Opposed Test between the user's Response + Stealth + Cybercombat versus the target's Response + Ste

Uploaded by

amhiggins
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views6 pages

Analyze Browse Command Edit: Common Use Common Use Common Use Common Use

Attack programs allow hackers to target other agents in the Matrix through various exploits and vulnerabilities. To use an Attack program requires a Complex Action and an Opposed Test between the user's Response + Firewall + Cybercombat skill versus the target's Response. Any net hits scored reduce the target's Response and Firewall ratings. Biofeedback Filter programs help resist mental intrusions and hacking attempts that target a user's persona. Damage from Black IC attacks is resisted with a test of Willpower + Biofeedback Filter. Black Hammer programs stealthily infiltrate other agents and systems without detection. To use a Black Hammer requires an Opposed Test between the user's Response + Stealth + Cybercombat versus the target's Response + Ste

Uploaded by

amhiggins
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

A N A L Y ZE B R OW SE C OM M A N D EDIT

COMMON USE COMMON USE COMMON USE COMMON USE


(or Firewall)
+ Computer

+ Data Search

+ (Varies)

+ Computer
Use a Simple Action to Analyze Icon/Node. Make a Browse programs are specialized search Command programs give the user Edit allows you to create, change, or delete any kind of
Matrix Perception test using your Computer + Analyze file. A Complex Action is required to alter one detail of a
program. For each hit scored, you can ask for one
routines that help track down information a modular and customizable file: about a sentence of text or a detail of an image or
on a particular node or in the Matrix at about a second of video or audio. This requires a
piece of information about the object (type, rating, control interface for various devices. successful Computer + Edit Test with a threshold set by
alert status, etc., see pg 228). If your target is running large. Use Browse programs for Data
a Stealth program, the test becomes an Opposed the gamemaster.
Search actions (p. 230).
Test, with the target rolling Hacking + Stealth (or This allows the user to control a Continuous editing of a device’s output requires the
Firewall + Stealth for programs or nodes).
Extended Test with a variable threshold device through the Matrix (p. 245), expenditure of a Simple Action every Initiative Phase for
the duration.
Detect Hacking on the Fly attempt or Probing with a and interval, depending on the general whether it be a surveillance
free roll using Analyze + Firewall (hacker’s Stealth)
Extended Test. availability of the information in question camera, a drone, or any other Note that controlling the device (via the Control Device
action, p. 229) may allow you simple control similar to
and the “area” being searched, Matrix-capable device. Edit (i.e., by freezing image capture at source or turning
Use + Data Search to find all of the agents in a node. respectively. off audio reception).

E NC RY PT R E A L IT Y F I L T E R S C AN ARMOR
COMMON USE COMMON USE COMMON USE HACKING
+ Electronic Warfare

System + Response
+ Response vs

(or Data Search)


+ Electronic Warfare

+ System
Encrypt programs utilize various cryptographic A Reality Filter program translates a node’s VR Scan programs allow you to locate wireless Armor programs are software redundancy and
schemes and ciphers to secure files, nodes, and sculpting into a metaphor of your choice by networks. To attempt to locate a hidden node, automatic backup systems that protect icons
communications. Encrypted items can be attempting to interpret the node’s algorithms. you must be aware of the node, or at least have from attacks that cause Matrix damage (p. 237).
decrypted with the proper passcode, otherwise a good guess of where the device should be (for
they are gibberish. When you first run this program or enter a node example, if your commlink is not detecting a Matrix damage to an icon from an Attack
while it is running, make an Opposed Test node for Mr. Johnson but you are pretty sure he program is resisted with a System + Armor
Use a Simple action to encrypt a file, set of files, between your Reality Filter + Response and the has a PAN, or when you can see the security program Test. (Damage from a Black IC attack is
node, or communication link. You also choose a node’s System + Response. If the filter wins, your drone but it is operating in Hidden mode). resisted with Willpower + Biofeedback Filter).
passcode that you or another user can use to preprogrammed paradigm overrides the node’s Deduct each hit scored on this test from the
decrypt the file. You may encrypt multiple files signals and you receive a +1 Response bonus To find the node, make a Electronic Warfare + modified Damage Value; any DV left over is
together into a single archive file. You may also while in that node. If the node wins, or a tie Scan (4) Complex Action. Or you may search for applied to the target’s appropriate Condition
attach a data bomb (p. 233) to an encrypted results, its metaphor overwhelms the filter enough Hidden nodes with an Electronic Warfare + Scan Monitor.
file. that you suffer –1 Response while in the node. (15+, 1 Combat Turn) Extended Test.
ATTACK BIOFEEDBACK FILTER B L A C K H AM M E R B L A C KO U T
HACKING HACKING HACKING HACKING
Response + Firewall
+ Cybercombat vs

+ Willpower

Response + Stealth
+ Cybercombat vs

Response + Stealth
+ Cybercombat vs
Attack programs are hostile code carriers that Damage from a Black IC attacks is resisted with Willpower + Black Hammer is a black IC program that samples Blackout is black IC program that is a non-
Biofeedback Filter. Deduct each hit scored on this test from
attempt to kill processes, introduce random the command transactions between the target lethal version of Black Hammer. It causes
the modified Damage Value; any DV left over is applied to the
input, create program faults, and otherwise try and his commlink and injects dangerous
target’s appropriate Condition Monitor.
biofeedback responses into the target’s simsense
Stun damage to both hot sim and cold
to crash an icon or program and are used in sim VR users. Like Black Hammer, it is used
cybercombat (p. 236).
Any attempt by the user to jack while under attack by Black IC interface.
takes a Complex Action and an Opposed Test between the with the Matrix Attack action (Opposed
user’s Willpower + Biofeedback Filter and the Black IC rating +
Response. If the Black IC ties or scores more hits, it prevents the Black Hammer is intended as a weapon against Test vs Response + Stealth, p. 231) and
To attack another icon, make an Opposed hackers in full VR using hot sim causing Physical
Test. Hackers attack using Cybercombat skill +
user from jacking out. has no effect on programs, agents, IC,
damage rather than Matrix damage in sprites, or AR users.
the rating of the program they are using. The The Damage Value for dumpshock is 5S for cold sim users, 5P cybercombat (Opposed Test vs Response +
defending icon rolls Response + Firewall. If the for hot sim users. Resist dumpshock damage with Willpower +
Biofeedback Filter rating. You also suffer disorientation in Stealth, p. 237). Against cold sim VR users, it only
attacker scores more hits, the attack addition to the damage: you suffer a -2 dice pool modifier on inflicts Stun damage. It has no effect on Damage from Blackout does not overflow
succeeds, otherwise the attack fails. all actions for (10 - your Willpower) minutes. programs, agents, IC, sprites, or AR users. into the Physical Condition Monitor.

D A T A B OM B DECRYPT D E F U SE ECCM
HACKING HACKING HACKING HACKING
(Hacking + Disarm)
Rating x 2 vs

Encryption Rating x 2
+ Electronic Warfare vs

Data Bomb Rating x 2


+ Hacking vs

(+ Electronic Warfare)
+ Signal rating
To set a Data Bomb you must choose the rating (up Cryptanalysis is an Electronic Warfare + Decrypt The sole purpose of the Defuse program is to Electronic counter-countermeasures (ECCM) filter out
to Program rating), whether or not it will delete the file (encryption rating x 2, 1 Combat Turn) Extended Test. deactivate data bombs that are protecting files jamming signals that attempt to disrupt a wireless
or crash the node as a secondary effect, and the When you reach the threshold, the encryption is broken. connection. An ECCM program adds its rating to the
or devices. It is used with the Disarm Data Bomb
passcode required to deactivate it. When you break the encryption of a file, the file Signal rating of the device on which it is running when
becomes decrypted. When you use this on a node, you action (p. 230).
defending against jamming (see p. 246).
To disarm a data bomb, make an Opposed Test may access that node, but it remains encrypted to
between your Hacking + Disarm and the Data Bomb others. To disarm a data bomb that you have Jamming on the fly (Unwired, p. 105) is a Complex
Rating x 2. If you score any net hits, the data bomb is detected, make an Opposed Test between your Action and requires some device with a Signal rating
Once you have initiated cryptanalysis, your Decrypt Hacking + Disarm and the Data Bomb Rating x
removed and deleted. If not, the data bomb (such as a commlink, radio, or drone) to act as an
program takes over and runs autonomously, using your
activates. 2. If you score any net hits, the data bomb is impromptu jammer. Make an Opposed Test between
Electronic Warfare skill rating. A running Decrypt program
can only work on one encryption at a time, but multiple removed and deleted. If not, the data bomb the rigger’s Electronic Warfare skill + Signal rating and
Data bombs inflict a number of boxes of Matrix Decrypt programs can work on different encryptions activates, causing its damage and possibly the target’s Electronic Warfare + Signal Rating +
damage equal to (rating x 1D6), then the data bomb simultaneously; each making its own Extended Test and destroying any file to which it was attached. ECCM. If the Opposed Test is successful, the signal is
is deleted. cannot collaborate with other programs. jammed; otherwise it is unaffected.
E X P L OI T M E DI C S N IF F E R S P O OF
HACKING HACKING HACKING HACKING
+ Hacking

(Damage Taken x 2)
+ Computer

(or Electronic Warfare)


+ Hacking

Computer + Track
+ Hacking vs
Hack on the Fly (p. 230 & p. 235) to create an account for
yourself on another node. Make a Hacking + Exploit (target’s
Use Medic to repair Matrix damage Intercept Traffic (p. 230); Make a Hacking + Sniffer Redirect Trace (p. 231); Make an Opposed Hacking +
Test; the hits from this test are the threshold for others to Spoof vs. the tracking icon’s Computer + Track; the
Firewall, Complex Action) Extended Test. inflicted on icons. detect the snooping. If you want to block or alter some number of net hits from this test are added to the
of the traffic before sending it along, you must use the threshold that the tracking icon needs. You may take this
Probing (p. 236) is a Hacking + Exploit Extended Test with a
Repair Icon action (p. 231); Make a Edit action. To insert fake traffic, make an Opposed action multiple times against the same target. This
threshold equal to the target’s System + Firewall. The interval is
1 hour in VR, 1 day by AR. Security accounts increase threshold Test of Hacking + Sniffer vs Firewall + System. action only works against a tracking attempt in progress.
by +3; Admin accounts by +6. The target node gets one free
Computer + Medic (damage taken x 2,
Analyze + Firewall (hacker’s Stealth) Test when you first log on Complex Action) Extended Test. When Capture Wireless Signal (p. 229); You must be within Spoof Command (p. 232); You must have an access ID
with the hacked account. If the node detects you, an alert is from which the target accepts commands (usually by
triggered (Alerts, p. 238).
the threshold is reached, all damage is the device’s Signal range and succeed in an
making a Matrix Perception test on the authorized source
Electronic Warfare + Sniffer (3) test, and then you may
removed from the target icon. Note that copy, record, or forward the traffic without another test or by tracing its icon). Choose a command (p. 229) and
Crashing Nodes and Programs (p. 230). Make a Hacking +
Exploit (System + Firewall, Complex Action) Extended Test.
it is possible for the threshold to change as long as you remain within the target device’s Signal
make an Opposed Test between your Hacking + Spoof
and the target’s Pilot + Firewall (System + Firewall for
When you reach the threshold, the node is crashed and during the Extended Test if the icon suffers range and keep the Sniffer program running. There is
peripheral devices); if you succeed, the target accepts
reboots (p. 238) or the Program is crashed. no way for other parties to detect your capture.
further damage. the command as legitimate.

STEALTH TRACK
HACKING HACKING
+ Computer (-Stealth)

Stealth is a clever hacker program that attempts to Track programs systematically analyze a user’s
hide the hacker from other system processes. While it connection and follow the datatrail back to the
cannot make an icon completely undetectable, it originating node.
makes the hacker seem innocuous by obfuscating
Trace User (p. 232) back to its originating node with a
his activities, erasing system tracks, and mimicking
Computer + Track - Stealth (10, Complex Action)
authorized traffic. Extended Test. The target may increase the threshold with
the Redirect Trace action. Success grants the target’s
While it is not used for any action, Stealth hides the access ID and the location of the device housing the
hacker from detection by the Firewall as he breaks originating node (usually the user’s commlink). If the target
into a system (p. 227), as well as from Matrix is using a wired connection to the Matrix, you learn his
Perception tests (p. 228) and Trace User attempts (p. exact location. If he is using a wireless connection, you
232, Computer + Track - Stealth (10, Complex have his location triangulated to within 50 meters. As long
Action) Extended Test. The target may increase the as you keep your Track program running, you may
threshold with the Redirect Trace action). continue to monitor the target’s location.
<PROGRAM NAME>
<+ Skill Most Used> PROGRAM TYPE

<Artwork>

<Program Rating:
(Use a Red marker to
fill in your current
Program Rating or
cut/paste supplied
dot pics)>

<Generalized rules and


most common actions
used with this program.>

You might also like