Matrix

Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

Matrix

Sunday, March 15, 2020 11:21 AM

Checklist for runs


Keep overwatch below 40
Take drugs
Psyche
Cram

Slave gear to deck, run silently

Slave up to 9 devices
If you want extra protection for some of your devices,
you can slave them to your commlink or deck. Your
commlink (or deck) can handle up to (Device Rating x
3) slaved devices, becoming the master device in that
particular relationship. The group consisting of your
slaved devices plus your master commlink or deck is
called a personal area network, or PAN.
See if you can protect heavy hitters.

IMPORTANT
2 Free actions + Complex action
Go to offensive
Take action 7*2+3=17
Go to defensive
8*2+3=19
DON'T DECK FROM HOME -> Set your car to drive you around while you hack 21
Rating 8
Shoot for hosts of rating 5?

11-3=8
8/2=4

13-3=10 5

Bootstrap usages
((Bootstrap: Invite 3 marks is a common one))
Boostrap to download a data bomb

Only use agents for legal stuff

Shadowrun Page 1
Matrix Rules
Saturday, February 29, 2020 9:58 AM

Matrix Combat 101


Data Trails 179

As a default, the actions the decker needs to take are these:


○ Hack on the Fly to mark the host
○ Enter Host
○ Matrix Search to find the paydata (base time 1 minute, hits reduce this, the Browse program halves it)
○ Matrix Perception on the paydata file to check for data bombs
○ HOTF to get a mark on file
○ Disarm Data Bomb
○ Crack File [note: this is an Attack action and will alert the host if successful]
○ Edit File to copy the file
○ Reboot

Illegal Actions

Flow chart

Decking-Flo
wchart-v8

Shadowrun Page 2
Shadowrun Page 3
Extended matrix rules
Friday, March 27, 2020 5:39 PM

[SR5] Matrix rules summary

Matrix Cheat Sheet

Matrix Rules Summary

Shadowrun Page 4
Strategies
Thursday, May 14, 2020 6:00 PM

Entering a host

Exiting a host

Running silent w/ wrapper

If you run as a dildo then maybe they won't pick you as the one they run matrix perception on.

Always remain running silent

Shadowrun Page 5
Databombs -> Strive for # of hits > BombRating x 2

Sleaze decking for low/midrange hosts. Attack decking for high end hosts.

Attack Ic right off the bat

Sleaze into actions instead

Kill Patrol IC at bottom of turn to prevent next stage of ic from spawning.

Attack decking

Referring to Ninja Vanish

Just attack IC and do what you want

Shadowrun Page 6
Dealing with Marks

Hacking Locations - Hack from moving vehicle (Grud Guided or with driver)
Hack from home -> get traced.
Hack from safehouse -> get trace.

Hacking from a grid guided vehicle

Without Patrol IC or Bloodhound, nothing can spot you (If you're not marked)

Shadowrun Page 7
After you've been spotted you'll need to hide

Host does not need to deploy IC in any specific order, can only deploy one IC per turn.

Low/Mid -> only threat is security response.

Booster Clouds (9 second duration, go in search, flag targets, then pop it):
If you’re doing a host dive, you do all the searches and flag all your targets, then pop it? Yeah, it’ll
last the whole active phase

Shadowrun Page 8
How useful are these given their duration?

Gigo and Masquerade to intercept conversations and make two people hate each other.
Fork Masquerade is one of my all-time favorite plays

(if you're doing masquerade it only makes sense that you'd be intercepting the messages for
them, but the idea of duplicating a persona is complicated because the matrix is fucky and they
didn't exactly think through a lot of the implications)

A GM might agree with that Wester but might not When using Masquerade, If return messages
are likely, and if those would be harmful to your plan, ask your GM first!

Failing a sleaze action, only the target/owner gets a mark on you not the master , not the host. But the
owner knows what you did.
Kill Code p 34 bottom of left hand side under pan/wan

Shadowrun Page 9
Ninja Vanish & Host convergence

Shadowrun Page 10
If you ever hit public grid with > 40 OS, you're fucked.

Shadowrun Page 11
Host Notes
Friday, March 6, 2020 10:45 PM

Ratings

Host IC
CRB 247

High Sleaze Hosts

Shadowrun Page 12
Actions
Sunday, April 19, 2020 10:28 AM

Attack
Brute Force (CRB 238)
Crack File (CRB 238)
Crash Program (CRB 238)
Data Spike (CRB 239)
Denial of Service (KC 37)
Erase Mark (CRB 239)
Haywire (KC 38)
Jam Signals (CRB 240)
Squelch (KC 39)

Sleaze
Check Overwatch Score (CRB 238)
Control Device (CRB 238)
Format Device (CRB 239)
Garbage In/Out (DT 178)
Hack on the Fly (CRB 240)
Hide (CRB 240)
Masquerade (KC 39)
Popup (KC 39)
Set Data Bomb (CRB 242)
Snoop (CRB 242)
Spoof Command (CRB 242)
Subvert Infrastructure (KC 39)
Watchdog (KC 40)

Data Processing
Calibration (KC 37)
Change Icon (KC 37)
Edit File (CRB 239)
Enter/Exit Host (CRB 239)
Grid Hop (CRB 240)
I am the firewall (KC 38)
Intervene (KC 39)
Invite Mark (CRB 240)
Jump into Rigged Device (CRB 241)
Matrix Perception (CRB 241 & KC 33 & KC 44)
Matrix Search (CRB 241)
Reboot Device (CRB 242)
Send Message (CRB 242)
Switch Interface Mode (CRB 243)
Tag (KC 40)
Trace Icon (CRB 243)
Trackback (DT 180)

Firewall
Disarm Data Bomb (CRB 239)
Full Matrix Defense (CRB 240)
Jack Out (CRB 240)

Shadowrun Page 13
Jack Out (CRB 240)
This jacks you out of the Matrix and reboots the device you are using. You suffer dumpshock
if you were in VR. The defense pool only applies if you’ve been linklocked (p. 229) by
someone; the test is against the icon that locked your link. If more than one persona has you
link-locked, you need to beat each of them individually: use a single roll and compare your
hits to rolls from each opponent who had established a link-lock.

You can only jack out yourself. You can’t dump other people except by beating them into
submission through Matrix damage.

Shadowrun Page 14
Programs
Tuesday, March 3, 2020 9:04 PM

Full Listing
Program Desc Action Stat Bonus
Bootstrap Format Device allows complicated tasks upon reboot. Format Device
Browse 50% faster Matrix Searches. Matrix Search
Configurator Store configs, recall them later. Reconfigure Deck
Edit Improves Edit File's limit. Edit File 2
Encryption Improves Firewall. Firewall 1
Search Better Matrix Search, but only for specified data. Matrix Search 2
Shredder Improves Edit File, but only deletion. Files difficult to restore. Edit File 2
Signal Scrub Reduces noise. Noise Reduction 2
Toolbox Improved Data Processing. Data Processing 1
Virtual Machine More programs, +1 Matrix Damage taken.
Agent
Armor Improves resistance to Matrix damage. Resist Matrix Attack 2
Baby Monitor See Overwatch Score.
Biofeedback Attacks biofeedback.
Biofeedback Filter Resist biofeedback damage. Resist Biofeedback 2
Blackout Matrix attacks biofeedback (Always stun damage).
Cat's Paw Data Spikes penalize instead of damage (2+marks). Data Spike
Cloudless Edit File pulls file out of the Matrix. Edit File
Crash Reboot Device has +2 Data Processing. Reboot Device 2
Decryption Improves Attack. Attack 1
Defuse Improves resistance to exploding Data Bombs. Resist Data Bomb 4
Demolition Improves Set Data Bombs' rating by 1. Set Data Bomb 1
Detonator Set Data Bomb can produce timed bombs. Set Data Bomb
Fly on a Wall Overwatch timer increases every 30 minutes while Hidden. Hide
Exploit Improves Hack on the Fly. Hack on the Fly 2
Evaluate Price off paydata.
Fork Matrix Action targets two targets.
Guard Reduce Mark DV bonuses to self. -1
Hammer Improves Matrix damage. Matrix Damage 2
Hitchhiker Take your friends to Neverland! Hopefully.
Lockdown Damaging a persona link-locks.
Mugger Increase Mark DV bonuses against others. 1
Nuke-from-Orbit Edit File permanently destroys files; Double Overwatch. Edit File
Paintjob Improves Erase Mark. Erase Mark Attack 2
Shell Resist damage. Resist Biofeedback Resist Matrix Attack 1
Smoke and Mirrors Improve Sleaze, but across-the-board penalty for Matrix actions. Sleaze 5
Sneak Resist Trace Icon; also prevents convergence from revealing your location. Resist Trace Icon 2
Stealth Improves Sleaze. Sleaze 1
Swerve Improves resistance to Reboot Device. Resist Reboot Device 1
Tantrum Data Spikes nauseate instead of dealing damage. Data Spike
Tarball Crash Program improves, but targets random programs. Crash Program 1
Track Improves Trace Icon. Trace Icon 2
Wrapper Wrap icons; Matrix Perception to break.

Details

Old listings

Shadowrun Page 15
IC
Sunday, May 10, 2020 6:48 PM

ACID - CRB p 248


Attack: Host Rating x 2 [Attack] v. Willpower + Firewall
Acid IC targets and overwrites your protective software.
When it gets 1 or more net hits on its attack, it
reduces your Firewall by 1. If your Firewall has been reduced
to 0 already, it causes 1 DV Matrix damage per
net hit on the attack. The reduction is cumulative and
lasts until you reboot the targeted device.

BINDER - CRB p 248


Attack: Host Rating x 2 [Attack] v. Willpower + Data
Processing
Binder IC corrupts your base operating system.
When it gets 1 or more net hits on its attack, it reduces
your Data Processing by 1. If your Data Processing has
been reduced to 0 already, it causes 1 DV Matrix damage
per net hit on the attack. The reduction is cumulative
and lasts until you reboot the targeted device.

BLACK IC - CRB p 248


Attack: Host Rating x 2 [Attack] v. Intuition + Firewall
Black IC is the most feared intrusion countermeasures
program on the market. The hosts that run it don’t want
you repelled—they want you dead. When it hits, Black
IC link-locks you. It also causes (Attack) DV Matrix damage
(+1 DV per net hit and +2 DV per mark on the target)
along with an equal amount of biofeedback damage.

BLASTER - CRB p 248


Attack: Host Rating x 2 [Attack] v. Logic + Firewall
Also known as Grey IC, a Blaster IC program’s attack
causes (Attack) DV Matrix damage, +1 DV per net
hit and +2 DV per mark on the target, with biofeedback
damage. The biofeedback from a Blaster program can
only cause Stun damage. A single successful attack also
link-locks the target.

CRASH - CRB p 248


Attack: Host Rating x 2 [Attack] v. Intuition + Firewall
If Crash IC has a mark on you (through its host) and
hits, one of your programs crashes, selected at random.
Programs crashed this way can’t be run again until after
a reboot.

JAMMER - CRB p 248


Attack: Host Rating x 2 [Attack] v. Willpower + Attack
Jammer IC turns your firewall against your own attacks.
When it gets 1 or more net hits on its attack, it reduces

Shadowrun Page 16
When it gets 1 or more net hits on its attack, it reduces
your Attack by 1. If your Attack has been reduced
to 0 already, it causes 1 DV Matrix damage per net hit
on the attack. The reduction is cumulative and lasts until
you reboot the targeted device.

KILLER - CRB p 248


Attack: Host Rating x 2 [Attack] v. Intuition + Firewall
This IC is a simple but effective cybercombat program
that causes (Attack) DV Matrix damage (+1 DV per
net hit and +2 DV per mark) on the target with each successful
attack.

MARKER - CRB p 248


Attack: Host Rating x 2 [Attack] v. Willpower + Sleaze
Marker IC installs tiny worm programs that mess with
your datastreams. When it gets 1 or more net hits on its
attack, it reduces your Sleaze by 1. If your Sleaze has
been reduced to 0 already, it causes 1 DV Matrix damage
per net hit on the attack. The reduction is cumulative
and lasts until you reboot the targeted device.

PATROL - CRB p 248


Attack: n/a
Patrol IC acts more like an agent than other intrusion
countermeasures. Its job is to patrol a host, scanning
people’s marks and looking for illegal activity using the
Matrix Perception action on all targets in the host. While
the act of placing a mark is an illegal activity, the act of
simply having a mark is not. Once you have the mark,
you are considered a legitimate user. Patrol IC has no
attack, but it shares its information with its parent host.
Since the Patrol IC doesn’t use Attack actions, it doesn’t
take Matrix damage when it fails. Most hosts have Patrol
IC and keep it running all the time.

PROBE - CRB p 248


Attack: Host Rating x 2 [Attack] v. Intuition + Firewall
The task of Probe IC is to mark intruders for other IC.
Every successful “attack” means another mark for the
host and its IC on the target, up to the maximum of three
marks.

SCRAMBLE - CRB p 248


Attack: Host Rating x 2 [Attack] v. Willpower + Firewall
Scramble IC nukes your connection to the Matrix and
forces you to reboot. If the host has three marks on you
when this IC hits you, you reboot immediately, taking
dumpshock if you were in VR.

SPARKY - CRB p 248


Attack: Host Rating x 2 [Attack] v. Intuition + Firewall
Sparky IC is also known as “Psycho Killer,” an upgraded
version of the popular Killer IC. It causes (Attack) DV

Shadowrun Page 17
version of the popular Killer IC. It causes (Attack) DV
Matrix damage (+1 DV per net hit and +2 DV per mark
on the target) with biofeedback damage.

TAR BABY - CRB p 249


Attack: Host Rating x 2 [Attack] v. Logic + Firewall
The Tar Baby IC link-locks you when it hits. If you’re
already link-locked, it puts a mark on you, up to a maximum
of three marks.

TRACK - CRB p 249


Attack: Host Rating x 2 [Attack] v. Willpower + Sleaze
Track IC follows the datastreams between your icon
and your deck. If this IC hits and the host has two marks
or more on you, the host (and its owners) discover your
physical location, which is usually reported to real-world
authorities immediately.

BLOODHOUND - Data Trails p 76


Attack: Host Rating x 2 [Attack] v. Willpower + Sleaze
This is a hybrid of Patrol and Track IC. It travels a host,
looking for illegal activity; when it finds it, it immediately
attempts to track the target by getting two or more
marks on it to learn its physical location. This has the advantage
of having no lag between discovery of a problem
and addressing it, but it means the patrolling action
stops once the Bloodhound attempts to Track, leaving
possible holes in a patrol design.

CATAPULT - Data Trails p 76


Attack: Host Rating x 2 [Attack] v. Intuition + Firewall or
Logic + Firewall (defender’s choice)
This IC combines some of the effects of Acid and
Blaster IC, doing damage to the target’s Firewall while
also sending some damage through to the user. If the
attack generates any net hits, it temporarily reduces the
target’s Firewall rating by 1, while also dealing (net hits)
Stun damage to the target. The damage is increased by
1 for each mark on the target. The Firewall damage is
repaired when the target reboots. Unlike Blaster, successful
attacks from Catapult do not link-lock the target.

SHOCKER - Data Trails p 76


Attack: Host Rating x 2 [Attack] v. Intuition + Firewall
Generally used in tandem with other forms of IC, the
goal of Shocker is to slow down the opposition. If its attack
hits, instead of doing Matrix damage, it reduces the
target’s Initiative Score by 5.

FLICKER - Kill Code p 67


Megacorporations have been developing IC for a
long time and have largely focused on lethal attacks
or significant interference. Last year, NYPD,
Inc. gained a non-lethal contract to protect several

Shadowrun Page 18
Inc. gained a non-lethal contract to protect several
buildings in Boston, and they included cybersecurity
as a part of that package. Unwilling to
just dump a hacker, the boys in blue spent some
money on non-lethal IC that also allows them to
study your avatar. Almost as soon as the IC was
developed, it was licensed to almost everyone on
the Matrix.

FLICKER RULES
Attack: Host Rating x 2 [Attack] v. Logic + Firewall
Flicker link-locks you when it hits and puts a mark on you. If
you have two marks on you, it disconnects you from the Matrix,
dealing dumpshock damage if appropriate. Although you
have been disconnected from the Matrix, your avatar doesn’t
disappear until you log back in using the same device, or after
[Device Rating] rounds. It remains where you left it, unable to
act, while other IC can attempt to trace your location or analyze
your avatar.

SLEUTHER - Kill Code p 67


With the development of Flicker providing a minor
marketing boost, Lone Star began developing their
own non-lethal IC. Instead of focusing on an intruder’s
avatar, Sleuther attempts to work out your habits
and trackable characteristics from the trail your
virtual presence leaves. The IC has had limited success
in stopping hackers but has provided the contact
details of many hackers that can be found—and
possibly recruited—by the Star.

SLEUTHER RULES
Attack: Host Rating x 2 [Attack] v. Logic + Firewall
This IC puts a mark on you if it hits. Each mark provides a
legitimate user with +2 dice on any Matrix Search actions or
Matrix Perception tests involving you. It works by applying
different behavioral algorithms and heuristics to try to work out
what sort of person you are. This IC also installs tracker code
into your avatar, enabling the IC to identify which grids and
hosts your avatar visits after the mark lands. Marks from this IC
may be removed normally.

BLUE GOO - Kill Code p 68


Sometimes Matrix security designers want IC
that is immediately threatening, stuff that will attack
you as soon as it detects you with a level of
force that would ruin your day. Other times, they
want IC that is sneakier, stuff that might draw you
into a fight, lead you to think you are doing well,
only to blow up in your face when you think the
battle’s won. Security designers who want the
latter effect want Blue Goo. This Wuxing creation
hits back if it’s hurt—the damage enters a quick
feedback loop in the programming and is spit

Shadowrun Page 19
feedback loop in the programming and is spit
back out as a withering attack. This destroys the
IC, but it will also do a number on the target. So
if you think you see some IC that looks like a fat,
juicy target that you can take out easily, be aware
of what might happen as it goes down.

BLUE GOO RULES


Attack: Host Rating x 2 [Attack] v. Logic + Firewall
If an avatar successfully deals Matrix damage to this IC,
it deactivates by exploding. Make a Host Rating x 2 [Attack] v.
Logic + Firewall Opposed Test. If this attack hits, the avatar is
link-locked by the host that launched the Blue Goo. The avatar
must resist (Attack) DV, and it is marked by the host. The avatar
must successfully Jack Out of the host to end the link-lock.

Shadowrun Page 20
Agents
Saturday, March 28, 2020 1:12 PM

Assisting Matrix Search


Rating 5 agent search Computer + Intuition [Data Processing] [(5+5)d6>5k9] Rating 5 Agent Search Assist
Rating 5 agent crack file Hacking + Logic [] (5+5)d6>5 Keep 9 Rating 5 Agent Crack File Assist
Remember to add +1 to Swipe's limit if the above gets any hits.

AGENTS
Agents are autonomous programs that are rated from
1 to 6. Each agent occupies one program slot on your
deck. Agents use the Matrix attributes of the device
they run on, and their rating (up to 6) for attributes.
Agents also have the Computer, Hacking, and Cybercombat
skills at a rating equal to their own. An agent
runs as a program and can use programs running on
the same device as them.
You can have your agent perform Matrix actions for
you. When an agent is running, it has its own persona
(and icon). An agent is about as smart as a pilot program
of the same rating (Pilot Programs, p. 269).
Any attack on an agent damages the device on which
it is running, rather than the agent itself (which is, after
all, merely a program). This means that if you’re running
an agent on your deck, you and it share the same Matrix
Condition Monitor.

One command I give my Agent is "Continually use Matrix Perception"

6*3=18
6*2=12

Shadowrun Page 21
Foundation
Tuesday, May 19, 2020 9:34 PM

Two-way trails https://runnerhub.neosynth.net/index.php?n=Resources.Foundations


run between null and master control, portal and scaffolding https://docs.google.com/spreadsheets/d/1rnXXMx5bIpCLWG8uCvc40ZskKptvciWaYywXWXcxnWc/edit#gid=0
control, and master control and security control; one-way
paths run from security control to archive, slave control to
security control, and master control to scaffolding control.

Shadowrun Page 22
Cyberdecks
Sunday, March 15, 2020 2:35 PM

Core
~200kish decks like the Tsurugi, 300, or Shadow Warrior

Data Trails

Kill Code

Shadowrun Page 23
Modules
Sunday, May 17, 2020 1:17 PM

HARDENING
The hardening module acts as a shield between your
deck and incoming damage. It has a Matrix Condition
Monitor with five boxes, and it takes damage before
your deck does. These boxes cannot be repaired.

INDUCTION RECEIVER
When you have this module installed, your deck can tap
into data cables and hardlines on contact. By placing your
cyberdeck directly onto the cable, it becomes directly
connected to the devices on either side of the cable.

MULTIDIMENSIONAL
COPROCESSOR
This tongue-twister of a module speeds up Matrix signals
and commands, granting the deck’s operator an
additional +1D6 to Matrix Initiative (remember that you
can never roll more than 5D6 worth of initiative dice).

OVERWATCH MASK
This handy module confuses GOD’s watchful eye by
pretending it’s part of the Matrix enforcement system.
The Matrix doesn’t converge on a deck with this mod
until its Overwatch Score reaches 4 more than normal
(making it 44 in normal conditions).

PROGRAM CARRIER
This module holds a program that your deck can run
permanently. You pick the program and we lock it in at
manufacture, which means you can’t change it, but hey,
it’s an extra program. Price includes the program cost.

SELF-DESTRUCT
This module is 98 percent explosive material by weight.
When your deck detects a specific pre-determined
condition (chosen by you), the module explodes, turning
your cyberdeck into a fragmentation grenade—see

Shadowrun Page 24
your cyberdeck into a fragmentation grenade—see
p. 435, SR5 for all the mayhem that causes. The deck,
of course, is completely unrecoverable, meaning maybe
don’t put one of these into a Fairlight Paladin.

VECTORED SIGNAL FILTER


By adding a dedicated signal filter to your deck, this
module gives you Noise Reduction 2.

Shadowrun Page 25
Matrix Knowledge Skills
Tuesday, June 16, 2020 5:45 PM

Matrix Knowledge Skills


Matrix
Resonance Theory
AI Theory
Matrix Threats

Matrix Crime
Matrix Games
Matrix Infrastructure

Matrix Security
Matrix Gangs

Datahavens

Foundations
Data Analytics
[Decker] Make sense of data dumps, like stuff to find location from photo of taliban agent.
Came up on run, not critical.
Verify this as a knowledge skill
Codes
Note: the specs are generic so ignore them

Not sure what it's used for

Research

Shadowrun Page 26
Shadowrun Page 27
Shadowrun Page 28
Shadowrun Page 29
Shadowrun Page 30

You might also like