ep hacking cheatsheet v1-1

1
Upgrading Status Yes Covert status Infosec test Excellent success improves status one step Spotted status Opposed Infosec test Win & Excellent success improves status one step Locked Status Not possible Use the System Once past the firewall, the Hacker may freely use any part of the system they have priveleges for. Other parts require an unopposed Infosec test with between a 0 and -30 penalty. Spotted status imposes a further -10 to this roll. Locked imposes -20. AR Illusions Must have hacked ecto /mesh inserts. Pre-made illusions pose -10 to -30 penalty to identify. Improvised illusions grant +10 to +30 to identify. Illusions grant -10 to -30 to target’s Perception or other actions. Backdoor Requires Infosec test (opposed if system monitored). Then requires Program- ming test (-20 for Security priveleges or -30 for admin). Once in place, Hacker may bypass firewall without a test. Crash Software Complex action. Requires Infosec test (opposed if crashing an AI, AGI or infomorph). 2 tests needed to crash AIs, 3 to crash AGIs and infomorphs. Eliminate Traces Complex action. Requires Infosec test (opposed if system monitored). Scripting Creating script requires Programming test. Max actions = (programming / 10) Loading script requires Infosec test (opposed if system monitored). Programmer’s Infosec used for script’s actions. Hacking VPNs Hacker must first hack a device connected to the VPN, then hack the VPN. Passive Countermeasures Locate Intruder Opposed Infosec test Win downgrades Hacker to Locked Status. Re-Authenticate At start of next Action Turn, Hacker must suceed at an Infosec test (with -10) or downgrade to Locked status Reduce Priveleges Protect logs from standard users’ access Active Countermeasures Counterintrusion Attack Hacker’s ecto/mesh inserts or PAN. Requires tracking. See p. 251-2 Lockout REquires security or admin priveleges. Opposed Infosec test (with Hacker suffering -20). Success ejects Hacker from the system. Trace Track Hacker’s physical location through mesh ID. Wireless Termination Complex action. Takes 1 turn, after which all wireless connections are severed, ejecting wireless or mesh connected Hackers. Reboot/Shutdown Complex action. Shutdown takes between 1 turn and 1 minute, after which Hacker is ejected. Reboot takes the same. Downgrading Status Hacker scores severe failure Status downgrades one step Hacker scores critical failure Status downgrades to Locked status Security Priveleges -20 to defeat firewall User Priveleges No penalty to defeat firewall Admin Priveleges -30 to defeat firewall STATUS PRIVELEGES SUBVERSION COUNTERMEASURES ECLIPSE PHASE HACKING CHEATSHEET Establish Connection by voidstate Feedback, corrections and suggestions welcome to [email protected] Defeat Firewall No System Monitored? Wired Hacker can jack in or tap cable carrying data traffic Standard Hacking Infosec Test Timeframe: 10 minutes Modifiers: Exploit quality, Firewall quality, Security priveleges (-20), Admin priveleges (-30) Spoofing Infosec Test Timeframe: 10 minutes Modifiers: Spoof quality, Firewall quality, Security priveleges (-20), Admin priveleges (-30) Note: Privilege level depends on traffic being sniffed. Brute-Force Hacking Opposed Infosec Test Timeframe: 1 minute Modifiers: +30 brute-force modifier, Exploit quality, Firewall quality, Security priveleges (-20), Admin priveleges (-30) Note At any time a hacker will have a connection type, status and privelege level. A system will be monitored or unmonitored, and have an alert level. Opposed Infosec Test Modifiers: Exploit quality, Firewall quality, Security priveleges (-20), Admin priveleges (-30) Mesh Target online Hacker knows mesh ID Wireless Target is wireless-capable & in range Hacker can locate Target Normal success Exceptional success Hacker fails, Defender succeeds Both fail Roll again on Hacker’s next action Hidden Status Hacker does not appear in logs, has admin priveleges and has +30 to subvert system - but not defend against countermeasures. Covert Status Hacker appears in logs as a legitimate user. May use the system at current privelege level. Spotted Status Hacker may use the system at current privelege level. System goes on Passive Alert (-10 to Hacker’s actions). System may engage Passive Countermeasures. Locked Hacker may use the system at current privelege level. System goes on Active Alert, inflicting a -20 to Hacker’s actions). System may launch Active Countermeasures. Hacker wins with excellent success, Defender fails Hacker succeeds, Defender fails Both succeed

Upload: christopher-plambeck

Post on 21-Jul-2016

6 views

Category:

Documents


2 download

DESCRIPTION

Cheat sheet for Eclipse Phase hacking skill process.

TRANSCRIPT

Page 1: EP Hacking Cheatsheet v1-1

Upgrading Status

Yes

Covert statusInfosec test Excellent success improves status one step

Spotted statusOpposed Infosec test Win & Excellent success improves status one step

Locked StatusNot possible

Use the SystemOnce past the �rewall, the Hacker may freely use any part of the system they have priveleges for.Other parts require an unopposed Infosec test with between a 0 and -30 penalty. Spotted status imposes a further -10 to this roll. Locked imposes -20.

AR IllusionsMust have hacked ecto /mesh inserts.Pre-made illusions pose -10 to -30 penalty to identify.Improvised illusions grant +10 to +30 to identify.Illusions grant -10 to -30 to target’s Perception or other actions.

BackdoorRequires Infosec test (opposed if system monitored).Then requires Program-ming test (-20 for Security priveleges or -30 for admin).Once in place, Hacker may bypass �rewall without a test.

Crash SoftwareComplex action.Requires Infosec test (opposed if crashing an AI, AGI or infomorph).2 tests needed to crash AIs, 3 to crash AGIs and infomorphs.

Eliminate TracesComplex action.Requires Infosec test (opposed if system monitored).

ScriptingCreating script requires Programming test. Max actions = (programming / 10)Loading script requires Infosec test (opposed if system monitored).Programmer’s Infosec used for script’s actions.

Hacking VPNsHacker must �rst hack a device connected to the VPN, then hack the VPN.

Passive Countermeasures

Locate IntruderOpposed Infosec test Win downgrades Hacker to Locked Status.

Re-AuthenticateAt start of next Action Turn, Hacker must suceed at an Infosec test (with -10) or downgrade to Locked status

Reduce PrivelegesProtect logs from standard users’ access

Active Countermeasures

CounterintrusionAttack Hacker’s ecto/mesh inserts or PAN.Requires tracking. See p. 251-2

LockoutREquires security or admin priveleges.Opposed Infosec test (with Hacker su�ering -20). Success ejects Hacker from the system.

TraceTrack Hacker’s physical location through mesh ID.

Wireless TerminationComplex action.Takes 1 turn, after which all wireless connections are severed, ejecting wireless or mesh connected Hackers.

Reboot/ShutdownComplex action.Shutdown takes between 1 turn and 1 minute, after which Hacker is ejected. Reboot takes the same.

Downgrading Status

Hacker scores severe failureStatus downgrades one step

Hacker scores critical failureStatus downgrades to Locked status

Security Priveleges-20 to defeat �rewall

User PrivelegesNo penalty to defeat �rewall

Admin Priveleges-30 to defeat �rewall

STATUS

PRIVELEGES

SUBVERSION

COU

NTE

RMEA

SURE

S

ECLIPSE PHASE HACKING CHEATSHEETEstablish Connection by voidstate

Feedback, corrections and suggestions welcome to [email protected]

Defeat Firewall

No

System Monitored?

WiredHacker can jack in or tap cable carrying data tra�c

Standard HackingInfosec TestTimeframe: 10 minutesModi�ers: Exploit quality, Firewall quality, Security priveleges (-20), Admin priveleges (-30)

Spoo�ngInfosec TestTimeframe: 10 minutesModi�ers: Spoof quality, Firewall quality, Security priveleges (-20), Admin priveleges (-30)Note: Privilege level depends on tra�c being sni�ed.

Brute-Force HackingOpposed Infosec TestTimeframe: 1 minuteModi�ers: +30 brute-force modi�er, Exploit quality, Firewall quality, Security priveleges (-20), Admin priveleges (-30)

NoteAt any time a hacker will have a connection type, status and privelege

level. A system will be monitored or unmonitored, and have an alert level.

Opposed Infosec TestModi�ers: Exploit quality, Firewall quality, Security priveleges (-20), Admin priveleges (-30)

MeshTarget onlineHacker knows mesh ID

WirelessTarget is wireless-capable& in rangeHacker can locate Target

Normal success

Exceptional success

Hacker fails, Defender succeeds

Both fail

Roll again on Hacker’s next action

Hidden StatusHacker does not appear in logs, has admin priveleges and has +30 to subvert system - but not defend against countermeasures.

Covert StatusHacker appears in logs as a legitimate user. May use the system at current privelege level.

Spotted StatusHacker may use the system at current privelege level.System goes on Passive Alert (-10 to Hacker’s actions). System may engage Passive Countermeasures.

LockedHacker may use the system at current privelege level.System goes on Active Alert, in�icting a -20 to Hacker’s actions).System may launch Active Countermeasures.

Hacker wins with excellent success, Defender fails

Hacker succeeds, Defender fails

Both succeed