黑客技巧与机师相比,黑客更关注矩阵的虚拟空间,而不是支撑它的琐碎基础设施。这并不是说黑客不会考虑光纤和多跳网络,但只要他们与矩阵有牢固的连接,他们就不太可能扫描电波或担心这些问题。
骇入赛博殖装有时很容易忘记,镀铬的赛博殖装并不意味着没有软件在它上面运行。也就是说,直到你遇到一个接口问题和两个“软件”不想彼此交流之前,它都不会出现在你的脑海中。如今,骇入赛博殖装比以往任何时候都要容易,暗影狂奔者应该密切关注他们的植入体是如何连接在一起的。大多数赛博殖装被设置为在植入期间连接到你的PAN的外围节点,并配置为开放访问,以便医疗技术人员可以快速访问植入体进行诊断和修复。大多数内部植入体通常可以通过低级别的无线连接访问。
> 暗影诊所和街头医生只要有一点编程方面的专业知识,就可以在客户请求时禁用这种无线连接,安排植入体发送错误的诊断信息,甚至可以很轻松地升级软件。
> Butch
> 好吧,但这是否意味着如果我和黑客或超链者打了一架他们就能找到我,关掉我的赛博武器?
> Hard Exit
> 也许是,但也可能不是。赛博武器和大多数在身体上有暴露区域的植入体通常需要通过接入端口等方式进行有线直接连接来访问,而不是通过无线信号。如果你真的很担心这个问题,你应该让你的赛博武器处于静默模式——或者更好的是,把它关掉。这并不总是最好的选择,但它可以防止被骇入。
> Butch
与其他设备相同,植入体也很容易受到病毒和其他恶意软件的影响。最容易受到这种干扰的设备是那些通过直接神经界面(DNI)连接在一起的设备——换句话说,就是任何你可以用思维控制的植入体。为了防止单个病毒或蠕虫感染他们的所有系统,许多街头武士和其他大量植入的狂奔者在关键的接入点(如数据插口)上预先安装了高级防火墙。如果恶意软件无法通过数据插口,它就无法感染你系统中其余的DNI植入体。
> 不过,骇入赛博殖装也能给你带来好处。举个例子,大多数人都没有意识到智能链是无线的。这意味着即使你没有握着你的智能枪,你可以向它发送命令。黑客同样也可以伪造对智能枪的指令。
> DangerSensei
> 是的。你也可以将恶意软件植入智能枪(它会传播并感染你的智能链)或使其崩溃以阻止它开火。
> Slamm-0!
> 在现代战争中,我们经常使用恶意软件和数据炸弹来破坏那些必须留下的设备,或者更糟的是,删除设备的操作系统。
> Picador
劇透 - :
HACKING CYBERWARE
Sometimes, it’s easy to forget that all that chrome doesn’t mean jack shit without the software running it. That is, until you get an interface problem and two pieces of ‘ware don’t want to talk to each other—then it comes to the forefront of your mind. Nowadays, it’s easier to hack cyberware than ever before, and shadowrunners should pay close attention to how their implants are wired together. Most cyberware is set up as peripheral nodes connected to your PAN during implantation, and configured for open access so that medtechs can access the implants quickly for diagnostics and repair. Most internal implants are usually accessible with a lowlevel wireless connection.
> Shadow clinics and street docs with a little programming expertise can disable this wireless connection if the client asks, arrange for the implant to send out false diagnostics, or even upgrade the software without much trouble.
> Butch
> Okay, but does that mean that if I get into a fight with a hacker or technomancer they can just reach out and turn off my cyberarm?
> Hard Exit
> Maybe, but probably not. Cyberarms and most implants that have an exposed area on the body often require direct wired connections through access ports and the like, not a wireless signal. If you’re really worried about it, you should keep your cyberarm in hidden mode—or better yet, turn it off. Not always the best option, but it prevents hacking.
> Butch
Like any other device, implants are susceptible to viruses and other malware. The devices most at risk to this sort of tampering are those connected together through direct neural input (DNI)—in other words, any implant that you can control with a thought. To prevent a single virus or worm from infecting all of their systems, many street samurai and other implant-heavy runners front-load a high firewall on critical access points like datajacks. If the malware can’t get past the datajack, it can’t infect the rest of the DNI implants in your system.
> Cyberware hacking can work to your advantage too, though. Just as an example, most people don’t realize that a smartlink is wireless. That means you can send a command to your smartgun even if you’re not holding it. And a hacker can spoof a command to that smartgun as well.
> DangerSensei
> Yep. You can also stick malware into a smartgun (which’ll spread to infect your smartlink) or crash it to prevent it from firing.
> Slamm-0!
> In modern warfare, it is common practice to use malware and databombs to disable equipment we must leave behind—or worse, erase the equipments’ operating system.
> Picador
订阅通讯链如今,几乎所有没有PAN的人都显然是犯罪黑客或超链者。在香港一条繁忙的街道上以“静默模式”行走,就相当于试图戴上荧光莫霍克头来让自己看起来不那么显眼。为了避免看起来像个笨蛋,你可以保留两个通讯链:一个是公开的合法终端机,另一个则是装载了所有非法程序的真正通讯链。只需将你公开的通讯链订阅给你隐藏的通讯链,你就可以像普通人一样四处走动。
> 尤其是对于犯罪者来说,保留一个合法的通讯链有其他的好处,而不仅仅是隐藏你需要静默运行的通讯链。你可以把你所有光明正大的账户和电子邮件与你的暗影生活分开。
> Kat o’Nine Tales
> 一些黑客过度使用订阅通讯链,将它们链接到一个“栈”中,以实现不同的目的,比如同时处于更多的节点中,或者在他们的直接命令下有更多的代理可用。这些业余爱好者喜欢认为他们可以从一个通讯链跳到另一个通讯链,同时回避IC的破坏性影响——嘿,如果我不在那里,它不会伤害我,对吗?错了。如果你退出节点,你的图标仍然在那——不管你是否注意到它,黑IC仍然能直接伤害到你。
> Slamm-0!
> 你为什么不能让通讯链单独运行呢?
> Sticks
> 因为不管你有多少通讯链,你只有一个大脑。如果你尝试同时使用两个通讯链,你会感到头痛,产生多感官幻觉,你的图标会尝试同时在两个通讯链上做同样的事情。解决这个问题的方法是将通讯链链接在一起——如我所说,是一个菊花链
(译注:即A连B,B连C,C连A的环形拓扑结构)——这样你每次只需关注一个图标(即使每个图标都在一堆不同的节点中),在栈中切换它们。
> Slamm-0!
劇透 - :
SUBSCRIBED COMMLINKS
Nowadays, just about anybody without a PAN is obviously a criminal hacker or a technomancer. Walking down a busy street in Hong Kong in hidden mode is the equivalent of trying to look inconspicuous with a day-glo mohawk. To avoid looking like a putz, you can keep two commlinks: a public, legal POS and your real commlink loaded with all of your tasty illegal programs. Just subscribe the public commlink to your hidden one, and you can walk around like a normal person.
> Keeping a legit commlink has other benefits than just to hide your hidden commlink, especially for SINners. You can keep all of your above-board accounts and e-mail separate from your shadow life.
> Kat o’Nine Tales
> Some hackers go overboard with subscribed commlinks, daisychaining them together into a "stack" for various purposes, like being in more nodes at once or having more agents under their direct command available. These amateurs like to think they can "hop" from one commlink to another and avoid the damaging effects of IC—hey, if I’m not there, it can’t hurt me right? Wrong. Unless you logout of the node, your icon is still present—whether you’re paying attention to it or not, and damage from Black IC still hurts you directly.
> Slamm-0!
> Why can’t you just have the commlinks running separately?
> Sticks
> Because no matter how many commlinks you have, you only have one brain. All of the data is going in there, and if you try to use two commlinks at once you’ll get a splitting headache, multisensory hallucinations, and your icons will try to do the same thing on both commlinks at once. The way around that is to link the commlinks together—daisy chaining, as I said—so that you’re only focusing on one icon at a time (even if each icon is in a bunch of different nodes), flipping through the stack.
> Slamm-0!
社会工程任何安保系统中最薄弱的环节都是泛人,这是一条古老的公理,对矩阵来说也是如此。老式的社会工程正在将古老的秘密技巧更新到第六纪元的数字领域,利用你们这些泛人类或好或坏的本性来获得访问节点或设备的权限。令人惊讶的是,各种各样的旧骗局都可以被改编成矩阵版本,或是随时间的推移出现新的花招。
从本质上讲,社会工程与你的骇入技能或程序无关;它与你理解和操纵他人的能力有关——这可能很棘手,因为通常来说,你永远都不需要与他人面对面交流。通常,社会工程可以涉及复杂的“集合”(将节点/AR广告装扮成属于合法公司或政府办公室的样子),或者使用公开可用的信息来说服目标人物相信公司的真实性或证明你是该公司的合法雇员。在许多情况下,社会工程的目标是信息(例如密码、账号、客户个人信息、SIN、节点列表),社会工程师试图以一些捏造的借口说服能够合法访问该信息的用户分享该信息,例如事故、保险索赔或研究需要。
社会工程的好处是,你不必冒着骇入节点的风险获取秘书或客户服务代表可以立即访问的基本数据;缺点是你不能保证它会起作用。毫无疑问,企业会花大量时间在员工的头脑中钻出合适的信息保护机制以对抗社会工程。所以,如果你遇到的首席秘书看起来有点疑神疑鬼,也不要感到太惊讶。
> 社会工程可以像伪装成矩阵妓院的员工并引诱安保人员以获取节点情报一样简单,也可以像是聘请拟感演员扮演各自的角色并让目标处于戏剧中一样复杂。我最喜欢的骗局是那些涉及到目标被自己的欲望或贪婪所背叛的。
> Dr. Spin
> 您真是有莎士比亚的风范,博士。
> Pistons
社会工程的关键是适合,这通常意味着要了解你试图欺骗的人的行话和程序。例如,拨打一个未公开的号码来找到一个薪奴,然后说“嗨,我是第九组的鲍勃,我在13C区对27B冲程6进行维护,我需要安保节点的密码授权来运行一些诊断”可能会起效,因为薪奴不会指望一个外人拨打那个电话,知道第9小组、13C区或者27B冲程6,所以这个请求有一种权威的感觉。
劇透 - :
SOCIAL ENGINEERING
It’s an old axiom that the weakest link in any security system is the metahuman element, and that holds true for the Matrix as well. Good old fashioned social engineering is updating the ancient confidence trick to the digital realm of the Sixth World, preying on the better or worse natures of your fellow metahumans to gain access to a node or device. It’s amazing the variety of old scams that can be adapted to the Matrix, or the new ones that have emerged over time.
At its heart, social engineering has nothing to do with your hacking skills or your programs; it has to do with your ability to understand and manipulate other people—which can be tricky, as in many cases you need never meet the other person face to face. Often, social engineering can involve elaborate "sets" (nodes/AR ads dressed up to look like they belong to a legitimate company or government office) or the use of publicly available information to convince the mark of the validity of the company or that you are a legal employee of it. In many cases, the goal is information (e.g., a passcode, an account number, client personal details, a SIN, a list of nodes), and the social engineer tries to convince a user with legitimate access to that information to share it on some fabricated pretext, such as an accident, insurance claim, or research.
The benefit of social engineering is that you don’t have to risk your fanny hacking a node to get basic data that a secretary or customer service rep has immediate access to; the downside is there’s no guarantee it’ll work. It should come as no surprise that corps spend a good bit of time drilling proper information safeguards into their employees’ heads to combat social engineering, so don’t be surprised if the first secretary you meet seems skeptical bordering on paranoid.
> Social engineering could be as easy as masquerading as a worker at a Matrix brothel and seducing a security weenie to gain intel on a node, or as elaborate as hiring sim actors to play their respective roles and put the mark in the middle of a drama. My favorite cons involve marks that are betrayed by their own lust or greed.
> Dr. Spin
> How very Shakespearean of you, Doctor.
> Pistons
They key to social engineering is fitting in—which usually means knowing the lingo and procedures of whomever you’re trying to trick. For example, calling a non-published number to get a flunkie and then saying “Hi it’s Bob from Field Group 9, I’m over at Sector 13C doing maintenance on a 27B stroke 6 and I need passcode authorization on the sec node to run some diagnostics” might work because the flunkie isn’t going to expect an outsider to call that number and know what Field Group 9, Sector 13C, or a 27B stroke 6 is, so there’s an air of authority to the request.