Wednesday, May 6, 2020

What EVERY Netrunner Should Know...

Steps in Cracking a Datafortress

The Typical Run

  1. Library Research to determine little facts about the corporation. May come in handy.
    • Load up a good selection of software. Necessary applications include one Decryption, one Intrusion, one Anti-ICE, one Protection, and a selection of utilities depending on the purpose of the intrusion, e.g. Viddy-Master for taking control of the computer controlled monitor system, Kneivel for controlling vehicles, etc. Reading and Copying files are functions of the Menu. Other programs like Demons, Daemons, Anti-Personnel and others are useful but the extremely lucky weefie-runner might survive a low-level datacrack without them.
    • Most programs require an activation and act once. Anti-ICE, Anti-Personnel, Decryption and Intrusion work once per activation. They may be activated again, but requires another action. Oter programs like Stealth and Protection and Demons are activated once and stay on until de-rezzed or deactivated.
  2. Decryption vs. Codegate (Decryption Program Str+1d10 vs. Codegate Str+1d10). If successful, proceed to step 4. If unsuccessful, continue to step 3.
  3. Intrusion vs. Datawall (Intrusion Program Str+1d10 vs. Datawall Str+1d10). If successful, proceed to step 4. If unsuccessful and unnoticed, try again. If unsuccessful and noticed, either a SysAdmin or an Anti-Personnel Program has been notified of your presence and will attempt to apprehend or discourage you, proceed to Combat!
  4. Stealth vs. Detection (Detection Str+1d10 vs. Stealth Str+1d10). If successful, proceed to step 5. If unsuccessful, the Detection Program has notified either a SysAdmin or an Anti-Personnel Program to apprehend or discourage you, proceed to Combat!
  5. Locate CPU and either run a Menu Command or operate a remote using the appropriate utility. Often, CPU's contain further defenses that may need to be averted and step 4 or Combat! may need to be repeated.

When the Shit Hits the Fan - Net Combat!

1. Initiative:
  • Human Intelligence + Deck Speed + 1D10
  • Computer Intelligence (CPUx3) + 1d10
1a. Winner declares first and takes one action, then each successive highest result acts in descending order.
1b. OPTIONAL RULE: Loser declares first, Winner acts first. Therefore, if an opponent is launches an Anti-Personnel Program towards the intruder, the intruder may either activate a suitable defense or take a chance and attack the opponent first.

2. Combat Options:
Intruder attacks ICE
Anti-ICE Program Str + Intelligence + Interface vs.
Program Str + Computer Intelligence (CPUx3).

Intruder attacks SysAdmin or SysAdmin attacks Intruder
Anti-Personnel Program Str + Intelligence + Interface vs.
Protection Program Str + Intelligence + Interface

Defending CPU attacks Intruder
Anti-Personnel Program Str + Computer Intelligence (CPUx3) vs.
Protection Program Str + Intelligence + Interface

Defending CPU attacks Intruder's Cyberdeck
Anti-System Program Str +Computer Intelligence (CPUx3) vs.
Cyberdeck's Datawall Str + Protection Program Str + 1d10

3. Damage:
Damage is allocated to affected systems or programs Strength (or Health in the case of Black ICE).

Reference

The Cyberdeck Menu

  • Log On/Off
  • Run Program
  • Read File
  • Copy File
  • Edit File
  • Erase File
  • LDL

Software

 Offense  Defense  Resolution
 Intrusion  DataWall Program Str+1d10 vs DataWall Str+1d10
 Anti-System  DataWall  Program Str+1d10 vs DataWall Str+1d10
 Decryption  CodeGate  Program Str+1d10 vs Codegate Str+1d10
 Detection  Stealth  Program Str+1d10 vs Program Str+1d10
 Anti-Personnel  Protection Program Str+Intelligence+Interface+1d10 vs. Program Str+Intelligence+Interface+1d10
Anti-ICE None     Program Str+Intelligence+Interface+1d10 vs. Program Str+Intelligence+Interface+1d10
 LDLNone  Roll under LDL Security Level
 Trace  None  Program Str+1d10 vs combined Trace Values
 UtilitiesNone  Roll under Utility Strength

Calculations

Computer Intelligence=
CPUx3
AI=
Computer Intelligence>12
Computer Memory=
CPUx40
Skills=
CPUx2.5@level 4
Base DataWall=
CPUx1 up to 10
Base CodeGate=
2 up to 10


File Types

  1. Inter-Office Memos
  2. Database
  3. Business Records
  4. Financial Transactions
  5. Grey Ops
  6. Black Ops

No comments:

Post a Comment

What EVERY Netrunner Should Know...

Steps in Cracking a Datafortress The Typical Run Library Research to determine little facts about the corporation. May come in handy. Load u...