黑客技巧以下规则扩展了SR4和其他暗影狂奔产品中关于黑客的选项,着眼于回答关于访问赛博殖装、电子设备、纳米机器人和其他设备的挥之不去的问题。
骇入赛博殖装并不是所有的赛博殖装都是可以被破解的,尽管它足够让黑客感兴趣。要确定一个特定的赛博殖装是否可以被骇入,必须满足以下条件(注意这些条件实际上适用于几乎所有设备,而不仅仅是赛博殖装):
首先,赛博殖装必须计算机化——并非所有的殖装都需要一台内置计算机。然而,大多数赛博殖装都是计算机化的(或至少配备了RFID传感标签),以便诊断时查询状况,远程或通过DNI进行控制,或与其他殖装/设备通信。参见DNI和无线功能,第31页,殖装。
其次,殖装必须能够被黑客通过有线或无线连接访问。大多数外部殖装(比如赛博义肢)只有有线连接,需要黑客物理接入才能访问设备。数据插口提供了一个直接神经界面,可以立即访问所有的赛博殖装。许多内部殖装都有无线连接,以帮助医务人员进行诊断(如跳线反射)或连接到其他设备(如智能链)。内部殖装的信号强度往往很低(通常为0),这意味着黑客需要在近距离进行攻击。这些殖装通常从属于角色的通讯链,所以潜入主节点的黑客就可以访问其从属(见从属,第55页)的殖装。一些内部殖装(如皮质炸弹)没有无线或DNI连接,因此与其他系统隔离,黑客需要通过手术来接入并访问设备。
如果满足了这些条件,黑客就可以按照正常的规则来骇入或欺骗赛博殖装。标准类型的赛博殖装的设备等级在SR4第214页中给出。一些殖装的节点/数据传输可能被加密以获得额外的保护,黑客需要先解密它们(参见加密,第65页)。和其他设备一样,赛博殖装可以在其编程和功能的限制内进行操作。在大多数情况下,此类操作不需要对具有合适访问权限的人进行检定。对于超出操作参数或访问权限的指令,可能需要一个指令+骇入与系统等级+防火墙的对抗检定。提供一份详尽的可能性列表会占用太多篇幅,但以下是一些例子(游戏鼓励玩家和GM在设计其他选项时发挥创造性——通常情况下,GM拥有最终决定权):
• 赛博眼可以被关闭或崩溃,使目标失明。
• 可以在黑客的赛博耳里播放预先录制或自行创建(使用计算机+编辑)的声音,让目标听到一些东西。
• 可以将犯罪证据(例如伪造的枪击视频)下载到殖装的存储空间中,将受害者陷害为犯罪者。
• 殖装可以被激活(例如,触发足部锚殖装以防止某人逃跑)或关闭(关闭内部气罐,迫使他们呼吸)。
• 目标人物因为停用DNI或被更改帐户权限(需要骇入+编辑检定)而无法控制自己的殖装。
• 控制一个殖装武器,并利用它攻击其他人,甚至是那个赛博义肢的所有者。
劇透 - :
HACKING CYBERWARE
Not all cyberware is hackable, though enough is to make a hacker’s interest worthwhile. To determine if a particular cyber-implant can be hacked, the following criteria must be met (note that these criteria actually apply to almost all devices, not just cyberware):
First, the cyberware must be computerized—not all implants need a built-in computer. Most cyberware, however is either computerized (or at least equipped with RFID sensor tags) so that it may be queried for diagnostics, controlled remotely or via direct neural interface, or communicate with other implants/devices. See DNI and Wireless Functionality, p. 31, Augmentation.
Second, the implant must be accessible by the hacker, via wired or wireless connection. Most external implants (like cyberlimbs) only have wired connections, requiring the hacker to physically jack in to access the device. A datajack provides immediate access to all cyberimplants with a direct neural interface. Many internal implants have wireless links to aid medical staff in running diagnostics (like wired reflexes) or to link to other devices (like a smartlink). The Signal rating of internal implants tends to be low (usually 0), meaning that a hacker needs to be in close range. Such implants are often slaved to the character’s commlink, however, so a hacker who infiltrates the master node can access slaved implants (see Slaving, p. 55). Some internal implants (such as cortex bombs) have no wireless or DNI connection and so are isolated from other systems, requiring surgery to allow a hacker to jack in and access the device.
If these criteria are met, the hacker can attempt to hack or spoof the implant following normal rules. Device ratings for standard types of cyberware are given on p. 214, SR4. Some implant nodes/transmissions may be encrypted for extra protection, requiring that the hacker decrypt them first (see Encryption, p. 65). Like other devices, cyberware can be manipulated within the limits of its programming and functionality. In most cases, such actions require no test to someone with the proper access privileges. In the case of commands that exceed operational parameters or access privileges, an Opposed Test pitting Command + Hacking Test versus System + Firewall may be required. It would take too much space to provide an exhaustive list of possibilities, but here are a few examples (players and gamemasters are encouraged to be creative when devising other options—as always, the gamemaster has final say):
• Cybereyes can be shut down or crashed to make the target blind.
• Pre-recorded or self-created (using Computer + Edit) sounds could be played within hacked cyberears to make the target hear things.
• Incriminating evidence (for example, forged smartlink footage of a shooting) could be downloaded into an implant’s memory, framing the victim for a crime.
• The implant may be activated (for example, triggering foot anchor implants to keep someone from running away) or shut down (turning an internal air tank off, to force them to breathe).
• The target character may be shut out of controlling his own implants by deactivating DNI or altering the account privileges (requiring a Hacking + Editing Test).
• Seizing control of a cyberarm and using it to attack others, or even the cyberlimbed character.
赛博殖装防护
一个角色该如何保护他的赛博殖装免遭骇入?
1.) 关闭或移除任何无线连接(见第31页,殖装)。
2.) 使用直接的物理连接而不是无线连接(仅外部殖装)。
3.) 保持低信号强度这样黑客就会在近距离攻击。
4.) 使用一个好的防火墙程序。
5.) 使用一个好的加密程序。
6.) 保持静默运行。
7.) 让殖装从属于你的安保通讯链(参见从属,第55页)。
8.) 安装数据炸弹、ECCM或IC程序。
骇入智能链和智能枪智能枪和智能链都是低级别的无线设备(信号强度为0),智能枪的默认模式是仅限私人访问——当购买枪支时注册的主要用户账户,该用户也可以为他的朋友和盟友建立访客账户,而不是让任何人拿起枪就可以访问智能枪链接和/或使用设备开火。为了防止他们的智能枪被骇入,一些用户将智能枪设置为静默模式或禁用无线接入,并使用手腕内侧的皮肤链接或数据插口连接智能枪(光纤线也有助于在角色掉落枪支时更容易恢复)。
通过智能链向智能枪发出指令是一个不需要检定的自由动作;通过通讯链或任何其他无线设备向智能枪发出指令是一个简单动作,需要成功的计算机+指令(1)检定。如果两个角色想要操控同一个智能枪,那就进行一个计算机+指令的对抗检定,获胜者将决定智能枪在这一轮中的表现。一些街头武士在他们的智能链中存储了一份指令程序的副本,专门用于这些检定。
错误诊断默认情况下,赛博殖装(和其他配置为开放访问的电子设备)提供有关设备当前状态的信息,包括设备的官方名称和序列号、所有者、执照编号、运行的操作系统软件版本、剩余的燃料或电力(如果适用)、关键温度、故障和上次维护、升级或修改的日期。黑客可以通过成功的软件+编辑检定来更改部分个人数据(所有者,执照编号);改变任何其他信息需要骇入+编辑检定(难度阈值由GM决定)。在低安保级别的环境中,守卫无法准确判断殖装是什么,一个带有有效执照的错误诊断读数就足以让角色在不需太多审查的情况下通过。
劇透 - :
FALSE DIAGNOSTICS
By default, cyberware (and other electronic devices configured for open access) provide information on the current state of the device, including the official designation and serial number for the device, the owner, the license number, the version of the operating system it is running, fuel or power remaining (if applicable), critical temperatures, malfunctions, and the date of the last maintenance, upgrade, or modification. A hacker can change some of the personal data (owner, license number) with a successful Software + Edit Test; changing any of the other information requires a Hacking + Edit Test (difficulty threshold determined by the gamemaster). In low-security settings where the guards cannot tell exactly what an implant is, a false diagnostic reading with a valid license can be enough to get the character through without too much scrutiny.
骇入电子设备角色可以识别一个陌生的电子设备,并通过成功的计算机+逻辑检定知道如何启动它。一旦设备启动,角色就可以访问它。大多数设备只有一个具有管理员权限的帐户,并且被配置为开放访问——任何人都可以访问并使用它们。更复杂和昂贵的设备可能有多个帐户和更多的公共访问限制。
设备通常具有有线接入(需要黑客物理接入)、无线接入或两者兼而有之。因为大多数硬件设备配置为开放访问,限制通常是硬接线的或预先编程的。绕过或修改设备上的硬件限制需要进行硬件+逻辑延续检定。参考SR4第125页的建设/修理表中的阈值和修正,间隔时间通常是10分钟(对于更大或更复杂的设备,间隔时间更长,这取决于GM的判断)。通常需要电子学工具箱(参见工具,第323页,SR4)或更好的工具。
通常,电子设备只有一个单一的等级,即设备等级(第212页, SR4),这用来代替它所有的矩阵属性。GM可以选择为特别重要的设备指定矩阵属性,而不是依赖于这个万能属性。当玩家角色试图在合法使用范围内操作设备时,他们会使用计算机+逻辑(用于设备的一般功能),或计算机+程序等级(如果是在正常参数范围内,但是为不寻常的任务)进行检定;如果玩家想让设备在合法参数之外发挥作用,那么就使用骇入+程序等级进行检定。
劇透 - :
HACKING ELECTRONICS
A character can identify an unfamiliar electronic device and figure out how to turn it on with a successful Computer + Logic Test. Once the device is powered up, characters can access it. Most devices only have a single account with admin privileges and are configured for open access—anybody can come by and use them. More complicated and expensive devices may have multiple accounts and more limited public access.
Devices generally feature wired access (requiring the hacker to physically jack in), wireless access, or both. Because most hardware devices are configured for open access, limitations are generally hardwired or preprogrammed in. Bypassing or modifying hardware limitations on a device requires a Hardware + Logic Extended Test. Refer to the Build/Repair Table on p. 125 of SR4 for the Threshold and modifiers, the Interval is usually 10 minutes (longer for larger or more complex devices, at the gamemaster’s discretion). A microtronics tool kit (see Tools, p.323, SR4) or better is typically required.
Generally, electronics only have a single rating, the Device rating (p. 212, SR4), which is used in place of all of its Matrix attributes. Gamemasters may choose to specify the Matrix attributes for particularly important device rather than rely on this catch-all. When a player character is attempting to manipulate the device within the bounds of legitimate use, they use Computer + Logic (for the general function of the device), or Computer + Program rating (if within the normal parameters but an unusual task); if the player wants to get the device to act outside of legitimate parameters, roll Hacking + Program rating.
关于控制设备的说明
操控无人机的方法不止一种。其他通过矩阵控制的设备也是如此。这里有一个快捷参考指南。
发出远程指令
你可以使用一个简单动作(参见发布指令,第221,SR4页)远程指挥你已订阅到你的化身(p. 221, SR4)的任何设备。你不需要和设备在同一个节点,只要它被订阅了,你的指令就可以发送到它们。可以将多个设备作为单一订阅来控制,但这意味着它们都只能接收相同的指令。节点、设备、代理、无人机、网精等都可以通过这种方式进行指令。
在这种情况下,接收指令的设备独立地执行指令。自驾+自动软件用于任何相关检定。如果指令很复杂,GM可以投自驾+响应能力来查看设备是否理解它们(参见第111页)。更复杂的指令可以通过脚本的方式发出(参见代理脚本,第105页)。
遥控设备
与其让设备自己操作,你也可以使用指令程序通过AR或VR直接访问它(参见遥控设备,第220页)。你必须登录到设备或订阅它到你的化身。该程序为你提供了一个虚拟界面,让你可以像玩视频游戏一样操控设备。大多数设备都有内置的指令程序,如果你没有自己的,也可以运行它。
遥控设备使用你的主动性。所有的检定都是由你使用指令+对应的技能。例如,要使用挂载位武器开火,你可以使用指令+自动枪械。要操控旋翼无人机绕树飞行,你可以使用指令+飞行驾驶加/减操控性。
设备、代理和无人机都可以被远程遥控。
跳入
你最后也是最直接的选择是通过全沉浸VR使用简单动作“跳入”设备(参见跳入无人机,第239页,SR4)。这只可能发生在有机师适配界面的设备上(第341页,SR4),通常是无人机和载具。在罕见的情况下,其他设备也具有机师适配界面。
以这种方式操纵的设备将根据机师的主动性行动,并使用机师的技能+对应的载具属性进行检定(参见通用机师/无人机检定,第105页)。
劇透 - :
A NOTE ON COMMANDING DEVICES
There’s more than one way to rig a drone. The same is true for other devices controlled through the Matrix. Here’s a quick and handy reference guide.
ISSUE REMOTE COMMANDS
You may remotely command any device that you have subscribed to your persona (p. 221, SR4) with a Simple Action (see Issuing Commands, p. 221, SR4). You do not need to be in the same node as the device, as long as it is subscribed and your command can reach them. Multiple devices may be controlled as a single subscription, but this means they all receive the same command. Nodes, devices, agents, drones, sprites, etc. may all be commanded this way.
In this case, the commanded device acts on the orders independently on its own action. Pilot + autosofts are used for any relevant tests. If the orders are complex, the gamemaster can roll Pilot + Response to see if the device comprehends them (see p. 111). More complicated orders can be issued in the way of scripts (see Agent Scripts, p. 105).
REMOTE CONTROL
Rather than letting the device operate on its own, you may access it directly via AR or VR, using the Command program (see Controlling Devices, p. 220). You must either log in to the device or subscribe it to your persona. The program provides you with a virtual interface, allowing you to control the device like a video game. Most devices have built-in Command programs, which you can run if you lack your own.
A remote-controlled device acts on your Initiative. All tests are made by you, using Command + an appropriate skill. For example, to fire a gun emplacement, you would roll Command + Automatics. To maneuver a rotordrone around a tree, you would use Command + Pilot Aircraft +/– Handling.
Devices, agents, and drones may all be remote controlled
this way.
JUMP IN
Your final, and most direct, option is to “jump into” the device with a Simple Action via full-immersion VR (see Jumping Into Drones, p. 239, SR4). This is only possible with devices that have rigger adaptation (p. 341, SR4), typically drones and vehicles. In rare occasions, other devices will feature rigger adaptation.
Devices rigged this way act on the rigger’s Initiative, and tests are made using the rigger’s skill + appropriate vehicle attribute (see Common Rigger/Drone Tests, p. 105).
骇入纳米体单个的纳米机器人太小也太简单,很难被单独骇入——即使你能成功控制它,也没有多大用处——而整个纳米机器人集群太复杂了,即使对于最复杂的虫群操纵程序也是如此。相反,黑客们专注于访问和重编程纳米巢,纳米传真系统,桌面纳米锻炉,或开启和关闭纳米殖装(参见开启和关闭纳米殖装,第108页,殖装)。
纳米体通常在很大程度上不能被控制,但是硬纳米改造系统可以通过支持他们的纳米巢进行重编程。单个纳米巢可以通过无线访问(信号强度0),并使用标准规则被骇入或欺骗(参见骇入赛博殖装,第102页);然后黑客就可以重编程纳米机器人(参见重编程硬纳米机器人,第107页,只装)。为了节省时间,如果黑客有一个纳米技术系统的样本和一个电子商店,她可以提前编写程序,然后简单地使用伪造指令进行上传。
纳米传真系统和桌面纳米锻炉普遍具有防骇入保护。通常情况下,这两种纳米制造设备都不会连接到矩阵上,除非它们需要进行软件升级或获得新的纳米结构图。与其他设备不同,纳米传真系统和桌面纳米锻炉通常像高度安保节点一样受到良好的保护,具有多级访问权、链接密码或纳米技术密钥、加密、设置在非工作时间激活的数据炸弹和主动式IC。如果黑客成功访问了纳米传真系统或纳米锻炉,他们只能生产他们有对应纳米制造设备的正确原料和纳米结构图的产品。纳米传真系统还受到了进一步的限制,它们只能制造某种特定类型的装备,例如个人电子设备或手枪。如果一个纳米传真系统或桌面纳米锻炉遭到损坏(活跃警报),而不是关闭,那么它将自毁。被盗的纳米传真系统和桌面纳米锻炉通常会以无线指令的方式被下令自毁,或者当它们离开其所在建筑物的wifi网络范围时自动自毁。
纳米结构图保存在高等级的安保节点中,合法用户使用密码登录节点,然后节点会发送一个有效的许可号来验证他们的登录,该许可号被硬编码到纳米传真系统处理器中,进而下载结构图。从安保节点下载纳米结构图时会进行加密。如果角色可以访问纳米传真系统,找到许可号需要硬件+逻辑(4)检定。纳米传真系统许可号只适用于对应的匹配帐户。纳米结构图非常昂贵,而且很少出现在P2P文件共享网络上(参见盗版,第94页)。
劇透 - :
HACKING NANITES
Individual nanites are too small and simple to be hacked individually—or for there to be much use if you managed it— and entire nanite colonies are too complex, even for the most sophisticated swarm-rigging programs. Instead, hackers focus on accessing and reprogramming nanohives, nanofaxes, and desktop forges, or triggering and shutting down nanoware (see Triggered and Shutting Down Nanoware, p. 108, Augmentation).
Nanites cannot normally be controlled to a great extent, but hard nanite systems can be reprogrammed from their supporting nanohive. Individual nanohives can be accessed wirelessly (Signal 0) and hacked or spoofed using the standard rules (see Hacking Cyberware, p. 102); the hacker can then get cracking reprogramming the nanites (see Reprogramming Hard Nanites, p. 107, Augmentation). To save time, if the hacker has a sample of the nanite system and a microtronics shop, she can write the program in advance and simply upload it using Spoof.
Nanofaxes and desktop forges have extensive protections against hacking. Typically, neither sort of nanomanufacturing device connects to the Matrix unless they are expecting a software upgrade or new nanoschematics. Unlike other devices, nanofaxes and desktop nanoforges are usually as well-protected as high-security nodes with multiple levels of access, linked passcodes or nanotech passkeys, encryption, data bombs set to activate during off-hours, and proactive IC. If a hacker does manage to access a nanofax or nanoforge, they’re limited to producing items that the nanomanufacturing device that they have the correct feedstocks to produce, and has nanoschematics for. Nanofaxes are further limited in that they can only create a specific type of gear, such as personal microtronics or pistols. If a nanofax or desktop nanoforge is compromised (an Active Alert) instead of shutting down it will self-destruct. Stolen nanofaxes and desktop nanoforges are typically ordered to self-destruct wirelessly, or do so automatically when they leave the range of the wifi network of the building they are in.
Nanoschematics are kept in high-level security nodes, and legitimate users download them by logging onto the node with their passcodes and then verify their log-on by sending a valid license number that is hard-coded into the nanofax processor. The nanoschematics are encrypted when downloaded from the secure node. Provided the character has access to a nanofax, finding the license number requires a Hardware + Logic (4) Test. A nanofax license number only works with the appropriate matching account. Nanoschematics cost serious nuyen, and few show up on peer-to-peer file sharing networks (see Piracy, p. 94)
代理服务器“代理服务器”是一个充当中介的程序例程,将数据从用户(客户端)传输到另一个用户或节点。代理服务器的优点是由它们作为中介,因此数据似乎是来自于代理服务器而不是客户端。黑客和暗影狂奔者发现代理服务器非常有用,无论是作为匿名转发者(混淆原始消息源),还是挫败追踪企图。
几乎任何节点都可以配置为代理服务器,尽管这通常需要管理员访问权和计算机+编辑(10,1主动性流程)检定来进行设置(如果你没有管理员权限,使用骇入代替计算机)。一旦设置好,从客户端通过代理服务器节点发送的消息看起来像是来自代理节点。为了确定消息的来源,黑客需要追踪消息到代理服务器节点,然后骇入该节点的访问日志(或者从该节点的管理员/所有者请求它,如果他们合作的话)。匿名代理服务器通常设置为不保留或删除消息传输日志。
黑客也可以通过代理服务器进行链接,以此作为一种阻止追踪的手段。使用的每个代理服务器将追踪检定阈值增加4。但缺点是,每个代理服务器减少1点黑客的响应能力。
发现追踪及时发现有人试图追踪你的数据踪迹(请参阅追踪, 第219页, SR4)有助于你重定向追踪或立即采用其他措施。为了发现追踪,你必须和启动追踪的尝试位于同一节点(例如,如果有人试图从你不在的节点的访问日志追踪你的数据踪迹,你将无法得知)。发现追踪需要一个矩阵侦察简单检定(1)。然而,如果追踪者试图保持隐匿追踪,你必须在一个使用分析+计算机对抗其追踪+隐匿的检定中击败他们。