Infinity Hacking v1.5
Infinity Hacking v1.5
Method of Rolling Normal Rolls and Modifiers When making a normal roll as part of a hacking attack, the targets BTS is applied to the WIP roll For example a Deva Hacker is on the other side of the wall to an Aquila guard so is able to make a normal roll to attempt to immobilise the HI. The deva must roll equal or under 9, (WIP 15 Deva -6 BTS of Aquila guard) to succeed.
EXAMPLE: A Deva Hacker is on the other side of the wall to an Aquila guard so is able to make a normal roll to attempt to immobilise the HI. The deva must roll equal or under 9, (WIP 15 Deva -6 BTS of Aquila guard) to succeed.
EXAMPLE: A Deva Hacker (WIP 15, BTS -3) is attempting anti-hacker protocols on a Fusilier Hacker (WIP12, BTS 0). The Deva will achieve a critical on a 15 (15 + (0)) while the Fusilier will achieve a critical on a roll of 9 (12 + (-3)) with normal rules of determining the winner applying.
Face to Face Roll and Modifiers Hacking vs. Defensive Hacking In the case of two hackers having a face to face roll the BTS modifier is applied to the opposing models. Whenever Hacker vs. hacker rolls are made if a critical is scored against a hacker that hackers device is disabled, and if the model disabled was the attacking hacker and they were using a repeater, the repeater is also disabled. EXAMPLE: a Deva Hacker (WIP 15, BTS -3) attempts to immobilise an Aquila guard who reacts with shooting (BS 15, BTS -6, and range modifier of +3) the Deva will gain a critical on a roll of 9 while the Aquila will get a critical on a roll of 18.
Hacking vs. Other ARO skill In the case of a Face to Face Roll vs. a non-hacking response the hacking roll is modified as per normal rolls with BTS modifier of the target applied to the hacker.
Multiple Hackers (Coordinated attack and/or Multiple defenders) There are a couple of specific Items to keep in mind 1) Co-ordinated hacking (each hacker attacking individually) my only receive an ARO from the target if within Zone of control (8)) 2) Defending Hackers may only oppose one attacking hacker each. 3) To succeed in hacking a single attacking model must succeed vs. all defending hackers (or against models BTS if not defended) 4) A single die is rolled by an attacker but each Face to Face paring is worked out separately.
EXAMPLE A: 1 Attacker vs. 2 Defenders A Deva Hacker (WIP 15, BTS-3) attempts to immobilise an Aquila guard who is behind a wall, a Fusilier Hacker (WIP 12, BTS -0) and a Swiss Guard Hacker (WIP 13, BTS -6) both Defend. IF the Deva rolls a 9 the Swiss Guard will suffer a critical and its hacking device will be disabled, a roll of 15 will be a critical and disable the Fusiliers hacking device. (however in this case the hacking attack will fail as the roll vs. the Swiss guard failed) The fusilier and Swiss guard would critical against the Deva on rolls of 9 and 10 respectively. The Deva must beat BOTH the defenders for the Aquila guard to be immobilised. EXAMPLE B: 2 Attackers vs. 1 Defender A Deva (WIP 15, BTS -3) and an Asura (WIP 15, BTS -6) are preforming a co-ordinated attack on a Aquila guard (BTS -6) out of LOF from both of them, they are defended by a Fusilier (WIP 12 BTS -0) The Fusilier can only defend against one of them, in this case choosing to defend against the Deva. The situation now has the Fusiler and Deva making a face to face roll, while the Asura is a normal roll vs. the Aquila guards BTS, if EITHER attacker wins the model is immobilised. EXAMPLE C: 2 Attackers vs. 2 Defenders A Deva (WIP 15, BTS -3) and an Asura (WIP 15, BTS -6) are preforming a co-ordinated attack on a Aquila guard (BS 15, BTS -6, and range modifier of +3) within 8and LOF for the Asura, it is also defended by a Fusilier (WIP 12 BTS -0), and a Swiss Guard (WIP 13, BTS -6). The defenders may each choose to defend against only one Attacker, but both may defend against the same attacker. In this case both are choosing to defend against the Deva, while the Swiss Guard shoots the Asura. This situation for the Deva is the same situation as Example A in this box, with the Deva needing to win against BOTH defensive hackers. The Asura must win the face to face vs. the Aquila shooting. If EITHER the Asura wins against the Aquila OR the Deva wins against BOTH defensive hackers the Aquila guard will be immobilised.
Repeaters These items allow a hacker to make hacking attacks within the zone of control (8) of the model (or deployed deployable repeated) as If it was their own zone of control. (All Hacking Devices including Defensive Hacking Devices count as repeaters) - This means models entering the zone of control of a repeater may receive Hacking AROs from models out of line of sight.)
Hacking Device plus only Models with a hacking device may also Mark targets (as a forward observer) without the requirement of line of sight.