Sunday, December 31, 2017

Rifts Matrix Decking Conversion Part 2

Decking actions in 3rd age might work like this, the player could either make a roll for each step or skip a few of the steps if the first success was by a large amount.

Step zero is Initiate Matrix Connection- The decker needs a Matrix connected computer and Computer Operation.
Step one is Recon, finding out where the systems are.  This finds hosts to attack.
This information can be gotten by social engineering tips from a person, or by using programs to learn this information.
Step two is Enumeration, finding out what the systems are.  This finds out more information about what is running on the host, including who manufactured, it and what data it is likely to contain.  Requires Computer Operation.  "To review some basic information, there are six types of Nodes in the game: CPUs, DSs, IOPs, SANs, SMs, and SPUs. Each has a distinct function, and each is classified with a color (Blue, Green, Orange, Red) and a security rating (1 through 7).
...
###CPU###
   Central Processing Unit

   Occurrence: 6.3% (1.0 per system)


   On Map: Hexagon with smaller concentric hexagon inside


   In Matrix: Hexagon-based polyhedron (technically, an octadecahedron - 18

              sides) with three orbital rings

   Notes: Each system has one, and only one, CPU. It's the brain of the system,

          so it's naturally the most heavily guarded.

   Functions: Go To Node - Transports the user directly to any Node on the

                           system without stopping at any Nodes along the way.
                           Note that it's a one-way trip, and after you've been
                           dropped off at your destination, you'll have to
                           fight your way back through any unconquered Nodes.

              Cancel Alert - Resets the alert system, canceling both Passive

                             and Active Alert status. Very handy... the only
                             way that alerts can be canceled, too. Note also
                             that when an alarm is going off inside a building,
                             the corporation's matrix system will be on Active
                             Alert as well. If you wanted to jack in at such a
                             time and were able to make it inside the CPU,
                             canceling the alert will end the alarm as well.

              Crash System - This crashes the system, ejecting you while

                             crippling the CPU. It only really has two uses:
                             Some Matrix runs will require that you crash a
                             CPU -- but more importantly, if you crash a corp's
                             CPU from inside the building, it will deactivate
                             all cameras and maglocks. Pretty nice.

   ###DS###

   Datastore

   Occurrence: 30.7% (4.9 per system)


   On Map: Square


   In Matrix: Cube with a hole in one visible face and pairs of triangular

              studs on each of the other two visible faces

   Notes: These Nodes are where you'll get all your data to sell. The vast

          majority of Matrix runs also involve some kind of data transfer from
          within a particular DS.

   Functions: Leave Node - Leaves the Node to travel to one of the adjacent

                           Nodes.

              Transfer Data - If you're on a Matrix run where you have to

                              upload a file to this particular DS, Transfer
                              Data will perform that function. Similarly, if
                              you're on a run that requires you to retrieve a
                              certain file from this DS, Transfer Data will do
                              that as well. In all other situations, choosing
                              this option will begin a search for random data
                              files. The higher the decker's Computer
                              attribute, the more likely you'll find something.
                              If something is found, you'll be given the option
                              of keeping the file on your deck. Pay attention
                              to the file sizes, as you can only hold as many
                              datafiles as can fit into your deck's free
                              Storage. Regardless of the Storage limitations,
                              though, your deck can only hold a maximum of five
                              files at a time, period. Rarely (unless you've
                              studied this guide and know where and when to
                              find them), you'll download a file that has
                              information that will help you in your quest.
                              When this happens, the screen will tell you that
                              you've found "an interesting file that you
                        download to your notebook." After you jack out,
                              be sure to check out your notebook for the new
                              clue.

              Erase - This command's only purpose is if you're on a Matrix run

                      to delete a file. Otherwise it's a waste of time, and one
                      more chance for the system to catch you and set off an
                      alert.

   ###IOP###

   Input/Output Port

   Occurrence: 16.3% (2.6 per system)


   On Map: Triangle


   In Matrix: Triangular pyramid with rounded bulges on each face


   Notes: These things are pretty useless. It may be worth noting, however,

          that IOPs (not SANs) are where you enter the system if you jack in
          from inside the corp building. Each terminal inside the building
          corresponds to a particular IOP, and generally speaking, terminals on
          higher floors with tighter security will lead to IOPs that are closer
          to the CPU.

   Functions: Leave Node - Leaves the Node to travel to one of the adjacent

                           Nodes.

              Lockout - As near as I can tell, this does nothing. It SOUNDS

                        like it does something, giving you the message and all,
                        but I've never noticed anything different after locking
                        out an IOP.

   ###SAN###

   System Access Node

   Occurrence: 6.3% (1.0 per system)


   On Map: Rectangle


   In Matrix: Rectangular computer chip with seven pins visible on the front

              face (kind of resembles the chips you would see on a SIMM for
              your PC)

   Notes: This is the first Node you will come to if you enter a system from a

          public terminal. SANs are generally very low security and will often
          be unguarded, even on high-end systems. Like the CPU, each system has
          one, and only one, SAN.

   Functions: Enter System - Leaves the Node to travel to one of the adjacent

                             Nodes (same as Leave Node in other Nodes).

   ###SM###

   Slave Module

   Occurrence: 19.4% (3.1 per system)


   On Map: Circle


   In Matrix: Sphere with two sets of square notches around it


   Notes: These can be a little bit of a help from inside corp buildings: each

          corp system is guaranteed to have both a Maglocks SM and a Cameras
          SM. Shutting off the former will disable all cameras, while shutting
          off the latter will open all maglocked doors. Besides that, though,
          SMs don't really have any other purpose. Note also that shutting off
          an Alert Control SM has no effect on either Matrix alerts or corp
          building alarms. Bummer.

   Functions: Leave Node - Leaves the Node to travel to one of the adjacent

                           Nodes.

              Turn Off Node - Takes the Node offline. As mentioned in the notes

                              above, this only has two uses, and is largely for
                              atmosphere, like the IOPs.

   ###SPU###

   Sub-Processor Unit

   Occurrence: 23.2% (3.7 per system)


   On Map: Hexagon


   In Matrix: Hexagon-based polyhedron (technically, an octadecahedron - 18

              sides)

   Notes: These types of Nodes are basically only there for structure. SPUs

          usually don't serve any purpose but to be just another Node with ice
          that deckers have to get through in order to reach the juicy CPUs and
          DSs. You'll spend a lot of time going from SPU to SPU in your
          travels.

   Functions: Leave Node - Leaves the Node to travel to one of the adjacent

                           Nodes."

Once you enumerate you get a map like this of what systems there are, possibly not showing the entire map until you access adjacent systems .


Step three is Vulnerability Analysis - finding out what systems have weaknesses which may be compromised.
Requires Computer Operation and Computer Hacking to make sense of the results and determine a plan of attack.
Step four is Execution - Requires Computer Hacking.  Each action costs points and the more points you have the more likely someone or program is going to notice the actions and come investigating.

Once you get execution rights to a host you can perform the following actions, each action requires a computer programming and computer hacking roll to see how well it went.  Every 100pts of action some type of counter measure will be deployed and the threat level will go up one from 1-to a varying number depending on the host security level (green,red, yellow, etc).  Once the host is at its max level it shuts down.  Every level the host will try try to either trace roll 1d4, 1 disconnect, 2 attack, 3 or deploy a decker of its own, 4 .

Access the Host or devices attached to the host like cameras, door locks, motion detectors, 5pts.

Control the Host - Execute commands on host, modify host configuration, shutdown host, deny host service. 25pts

Index the Host to determine exactly whats on it. 10pts

Access host files - read, copy or modify host files. 5/10/25pts

Some example system maps:
http://www.shadowrun.com/forums/discussion/28487/oldskool-matrix-maps-for-sr1-sr2-and-sr2050-for-your-perusal

Matrix Connections in the Merctown Docks are only available at Retrofit Robots and the Dragon's Head Brewery Medium quality rooms.


Here is an attempt at mapping computing in Rifts to systems based on:
http://3rdageofdragonwright.blogspot.com/2009/06/rifts-matrix-conversion.html
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf
http://shadowrun.wikia.com/wiki/Host_System
http://shadowrun.wikia.com/wiki/Shadowrun_(Sega)/The_Matrix

No comments:

Post a Comment