0% found this document useful (0 votes)
154 views2 pages

Infinity Hacking v1.5

This document summarizes the rules for hacking in Infinity. It outlines how hacking rolls are modified based on the hacker and target's BTS. It provides examples of different hacking scenarios, such as one hacker attacking one or multiple defenders, and coordinated attacks. It also describes actions hackers can take in attack and defensive modes, including immobilizing units, anti-hacker protocols, and assisting deployments.

Uploaded by

Tracy Bloom
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
154 views2 pages

Infinity Hacking v1.5

This document summarizes the rules for hacking in Infinity. It outlines how hacking rolls are modified based on the hacker and target's BTS. It provides examples of different hacking scenarios, such as one hacker attacking one or multiple defenders, and coordinated attacks. It also describes actions hackers can take in attack and defensive modes, including immobilizing units, anti-hacker protocols, and assisting deployments.

Uploaded by

Tracy Bloom
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Hacking Advanced Electronic Warfare

Method of Rolling Normal Rolls and Modifiers When making a normal roll as part of a hacking attack, the targets BTS is applied to the WIP roll For example a Deva Hacker is on the other side of the wall to an Aquila guard so is able to make a normal roll to attempt to immobilise the HI. The deva must roll equal or under 9, (WIP 15 Deva -6 BTS of Aquila guard) to succeed.

EXAMPLE: A Deva Hacker is on the other side of the wall to an Aquila guard so is able to make a normal roll to attempt to immobilise the HI. The deva must roll equal or under 9, (WIP 15 Deva -6 BTS of Aquila guard) to succeed.

EXAMPLE: A Deva Hacker (WIP 15, BTS -3) is attempting anti-hacker protocols on a Fusilier Hacker (WIP12, BTS 0). The Deva will achieve a critical on a 15 (15 + (0)) while the Fusilier will achieve a critical on a roll of 9 (12 + (-3)) with normal rules of determining the winner applying.

Face to Face Roll and Modifiers Hacking vs. Defensive Hacking In the case of two hackers having a face to face roll the BTS modifier is applied to the opposing models. Whenever Hacker vs. hacker rolls are made if a critical is scored against a hacker that hackers device is disabled, and if the model disabled was the attacking hacker and they were using a repeater, the repeater is also disabled. EXAMPLE: a Deva Hacker (WIP 15, BTS -3) attempts to immobilise an Aquila guard who reacts with shooting (BS 15, BTS -6, and range modifier of +3) the Deva will gain a critical on a roll of 9 while the Aquila will get a critical on a roll of 18.

Hacking vs. Other ARO skill In the case of a Face to Face Roll vs. a non-hacking response the hacking roll is modified as per normal rolls with BTS modifier of the target applied to the hacker.

Multiple Hackers (Coordinated attack and/or Multiple defenders) There are a couple of specific Items to keep in mind 1) Co-ordinated hacking (each hacker attacking individually) my only receive an ARO from the target if within Zone of control (8)) 2) Defending Hackers may only oppose one attacking hacker each. 3) To succeed in hacking a single attacking model must succeed vs. all defending hackers (or against models BTS if not defended) 4) A single die is rolled by an attacker but each Face to Face paring is worked out separately.

EXAMPLE A: 1 Attacker vs. 2 Defenders A Deva Hacker (WIP 15, BTS-3) attempts to immobilise an Aquila guard who is behind a wall, a Fusilier Hacker (WIP 12, BTS -0) and a Swiss Guard Hacker (WIP 13, BTS -6) both Defend. IF the Deva rolls a 9 the Swiss Guard will suffer a critical and its hacking device will be disabled, a roll of 15 will be a critical and disable the Fusiliers hacking device. (however in this case the hacking attack will fail as the roll vs. the Swiss guard failed) The fusilier and Swiss guard would critical against the Deva on rolls of 9 and 10 respectively. The Deva must beat BOTH the defenders for the Aquila guard to be immobilised. EXAMPLE B: 2 Attackers vs. 1 Defender A Deva (WIP 15, BTS -3) and an Asura (WIP 15, BTS -6) are preforming a co-ordinated attack on a Aquila guard (BTS -6) out of LOF from both of them, they are defended by a Fusilier (WIP 12 BTS -0) The Fusilier can only defend against one of them, in this case choosing to defend against the Deva. The situation now has the Fusiler and Deva making a face to face roll, while the Asura is a normal roll vs. the Aquila guards BTS, if EITHER attacker wins the model is immobilised. EXAMPLE C: 2 Attackers vs. 2 Defenders A Deva (WIP 15, BTS -3) and an Asura (WIP 15, BTS -6) are preforming a co-ordinated attack on a Aquila guard (BS 15, BTS -6, and range modifier of +3) within 8and LOF for the Asura, it is also defended by a Fusilier (WIP 12 BTS -0), and a Swiss Guard (WIP 13, BTS -6). The defenders may each choose to defend against only one Attacker, but both may defend against the same attacker. In this case both are choosing to defend against the Deva, while the Swiss Guard shoots the Asura. This situation for the Deva is the same situation as Example A in this box, with the Deva needing to win against BOTH defensive hackers. The Asura must win the face to face vs. the Aquila shooting. If EITHER the Asura wins against the Aquila OR the Deva wins against BOTH defensive hackers the Aquila guard will be immobilised.

Repeaters These items allow a hacker to make hacking attacks within the zone of control (8) of the model (or deployed deployable repeated) as If it was their own zone of control. (All Hacking Devices including Defensive Hacking Devices count as repeaters) - This means models entering the zone of control of a repeater may receive Hacking AROs from models out of line of sight.)

Hacking Device plus only Models with a hacking device may also Mark targets (as a forward observer) without the requirement of line of sight.

ATTACK MODE Actions


All Attack mode actions must target a model within 8 of the Hacker or a Friendly repeater (Including other hacking devices) Line of sight is not required. Access Doors/Terminals and other objectives (Unless otherwise specified in scenario - only in Active Turn) The Object/Objective will have a BTS value to modify the roll, and rules of the scenario will state if they can be defended by opposing Hackers and if repeaters can be used. Immobilize HI or REM (Non-Ariadnan) (Active or Re-active Turn) Any number of attempts may be made to immobilise enemy HI or REM (Short Skill each attempt) unless using a coordinated order repeaters may be used. Immobilize/Possess TAG (Non-Archaic) (Active or Re-active Turn) Each hacker may make one attempt to hack a TAG, when making the attempt the hacker must declare whether they are going to attempt to immobilise or possess the TAG (Humans may not possess a CA TAGs. In either case a short skill is used to make the initial attempt, if successful and the player declared a possession attempt a second short skill must be used, if this fails the TAG is no longer immobilized. Anti-Hacker Protocols With 3 or more hackers. A model that is attacked by anti-hacker protocols may either make an ARO and Anti-Hacker Protocols (Active or Re-active Turn) defend with BTS against a normal roll or defend with a Face to Face WIP An enemy Hacker is targeted with a short skill, the (modified by each models BTS), additional defenders may also face the targeted model may make may react with attacking roll as normal. The attack will only cause unconsciousness (or fatality defensive hacking if another ARO has not been in the case of a critical) against the original target and only if successful against declared otherwise a normal roll is used. all defending rolls only the targeted model can damage the attacking model (all Whichever hacker loses (assuming the other model models can disable repeaters with critical rolls as normal). In the case of cosucceeds), will immediately be reduced to 0 ordinated hacking any single defender who successfully beats all models wounds, in the case of a critical they are instead defending (and/or BTS) will cause the damage). reduced to -1 wounds. Anti-Hacker Protocols Multiple ARO attacks through a repeater. If a model enters the ZoC of a repeater (in this case a Swiss Guard Hacker (WIP 14, BTS-6) moves within 8 of a Minesweeper Probot with its first short skill. The Hackers belonging to the reactive player may declare anti-Hacker protocols, (in this case one Deva (WIP15 BTS-3) and one Asura (WIP 15, BTS-6). In this situation the Swiss Guard Can choose to defend against ONE of the attackers with the second short skill (Hacking defensively only permits targeting one attacker) so if the Swiss guard defends against the DEVA and rolls an 11 (Critical) the Deva would be killed and the Probot would have its repeater disabled (it can still move and use the minesweeping function) The Asura would have a WIP normal roll modified by the Swiss Guards BTS (i.e. will Critical on a 9). EVO Assistance If a player has a model with EVO Repeater it may use ONE of the following programs for each attack (Active turn Only) at no additional cost. Capture A hacking attack against a non-CA TAG will possess the model with a single roll (and order) Ice-Breaker Halve the BTS of the target (rounding down (BTS-3 becomes BTS-2) Co-operative Additional friendly hackers may spend orders to add a +3 each to the hacking attack. Additionally The EVO may spend an order to be spent to do the following. Trajectory Assistant The owning player may add +3 to the PH roll of a model deploying by AD3

DEFENSIVE MODE Actions


-These actions may take place irrespective of range and line of sight. Hack Defensively (Re-active Turn Only) A may during declaring AROs of a model under attack from hacking, may declare one or more of their hackers to defend, the hackers replace the BTS of the model with their own, and make the roll a face to face roll against the them Airborne Deployment (Active Turn Only) A player during their active turn may spend an order to attempt to hack airborne deployment craft. This is done vs. a BTS of -9, (or Face to Face if opponent defensively hacks) regardless of success the opponent must declare if there are troops deploying by AD3 (troops with AD3 deploying by lower levels must have it written down to avoid an emergency jump.) all troops will deploy to a single template placed by the owning player on the table scattering as normal with a -9 to PH. EVO REPEATER Hacking player places the template instead Guided Missiles (Non-Ariadnan) (Re-active Turn Only) Hackers owned by a player with a model attacked by guided ammunition may counter the projectile with a normal hacking roll vs. a BTS of -3, This can never be a Face to Face roll. EVO REPEATER Hacking player also removes one Marker from the target of the guided missiles.

You might also like