Guide to Hacking
!Blackhat_1.pngWelcome to the electrifying world of cinematic cyberpunk hacking! This guide breaks down the optional rules from Pyramid Magazine 3/21 ("Console Cowboys and Cyberspace Kung Fu"). Designed for action-packed cyberpunk games, these rules prioritize speed and movie-style flair over deep simulation.
The Hacker: Blackhat, Decker, Console Cowboy
You are the digital ghost, the infiltrator of virtual fortresses. Your role is to navigate The Net, bypass security, steal or alter data, and control systems to support your team.
- Core Needs: High IQ. Essential skills: Computer Hacking, Computer Operation, Computer Programming, Expert Skill (Computer Security).
- Essential Gear: Your specialized computer (Cyberdeck) and your suite of Hacking Programs.
Understanding the Digital Landscape: Network Components
Before you hack, know what you're hacking into:
- The Net (Cyberspace): The global network connecting everything.
- Network: A specific, often private, collection of connected systems (corporate intranet, building security, etc.). Your target area.
- Network Access Point (NAP): Your doorway into a specific Network.
- External NAP: Connecting remotely via The Net. Faces external firewalls/ICE. Convenient, but distance/routing might give penalties (-1/-2).
- Internal NAP: Physically plugging in locally or strong local wireless. Bypasses external firewall but requires physical infiltration. Faces internal security. - Computer: An individual processing unit (server, mainframe, etc.). Runs programs, stores data. Often has own ICE. Your Cyberdeck is your computer.
- Terminal: Device for interacting with a Computer (keyboard, screen, VR). Input/output only.
- Node: Generic term for any distinct point/device on a Network (Computer, Terminal, camera, etc.).
Analogy: The Net = World roads. Corporate Network = Private estate roads. Main Gate = External NAP. Server Room = Computer. Wall Socket in Server Room = Internal NAP. Security Monitor = Terminal. Any junction/device = Node.
The Tools of the Trade: Hardware & Software
Hardware: Computers, Interfaces, and Decks
!Blackhat_5.pngComputers & Complexity: Key stat is Complexity.
- Individual Program Limit: Computer's Complexity must be >= program's Complexity.
- Total Program Limit: Uses 2/20/200 scaling (B472/UT22). Complexity X runs: Two C(X) programs, OR Twenty C(X-1), OR Two Hundred C(X-2), etc. Limits total running programs (active + continuous).
Interfaces (Connecting to The Net): How you perceive The Net.
- Terminal: Slowest.
- Basic VR: Goggles/gloves. Req. Complexity 4+.
- Full VR: More senses. Req. Complexity 5+.
- Total VR: Direct brain link. Fastest. Req. Complexity 6+. Physically vulnerable. AIs use this.
Interface Clashes: Slower interface takes -2 penalty per "step" difference in contests.
Cyberdecks: Computers optimized for VR hacking.
- Key Advantage: Hard-coded VR software doesn't use a high-Complexity program slot. Frees processing for hacking programs.
- Variety: See wiki for models like HackMind or HackMate.
Software: Hacking Programs
!Blackhat_4.pngYour digital toolkit. Uses your computer skills as a base.
- Program Power: Base Complexity. Higher Complexity versions add +1 effective skill/level above base.
- Execution Modes: Single-use or Continuous. Continuous programs count towards total running program limit.
- Throttling Complexity (GM Call): Ask GM if you can run advanced software at Base Complexity (likely losing skill bonuses) to save processing load.
- Improvising: H4XX0R skill might let you fake a missing program (e.g. -4 skill, counts as +1 Complexity).
- Sources: Programs can be bought, found, pirated, or acquired as freeware (may have quirks).
Initiating the Hack: Getting Connected
Before the netrun begins, you need to establish a connection to the target Network. How you do this depends on the situation:
- Finding the Target: First, you need to know what you're hacking. This might involve real-world investigation, buying info from contacts, or using online search tools (potentially requiring Research or Streetwise skills) to find the network address or physical location of a relevant NAP.
- Choosing Your Access Method:
- Remote Hacking (via External NAP): You connect from your own safe location (your apartment, a net café, the back of the team van) through The Net to the target Network's publicly accessible point (like their website server or main communications gateway). This is safer physically but means you immediately face the network's outermost defenses – usually a strong firewall protected by ICE.
- Local Hacking (via Internal NAP): Your team physically infiltrates the target location (e.g., sneaking into the corporate office building). You find a physical data port in a wall or computer, or get close enough for a strong, direct wireless connection to their internal network. This bypasses the tough external firewall but exposes your physical body to guards, security patrols, and other real-world dangers. You'll still face the internal security measures of the network once connected.
- Making the Connection: Once you've chosen your NAP and are ready, you use your Interface (Terminal, VR, or Total VR) and Cyberdeck to establish the link. The GM might require a simple Computer Operation roll if the connection method is unusual or technically difficult, but usually, just declaring the connection is enough to start the netrun proper.
- First Obstacle: The netrun usually begins the moment you encounter the first layer of security protecting the NAP or the Network itself. For external connections, this is almost always the main firewall ICE. For internal connections, it might be the ICE on the specific computer you jacked into, or a network-wide internal monitoring system.
The Netrun: Executing the Hack
!Blackhat_3.pngOnce connected and facing the first obstacle, the netrun proceeds in abstract "rounds," similar to a chase scene.
The Digital Environment & Defenses
Networks have automated programs (ICE, Analyze, etc.) and potentially active Sysadmins or AIs. Layered ICE is standard.
Netrun Rounds & Actions
- Initiative: Highest computer Complexity acts first when timing matters.
- Declare Action & Complexity Check: Choose program(s) to activate. Ensure total load (active + continuous) is within 2/20/200 limit.
- Roll Dice: Make skill rolls for active programs.
- One active program: Roll normally.
- Multiple active programs: Take -1 to all active rolls per program activated beyond the first.
- Contested Rolls: Pit skill vs. defender's in a Quick Contest. Apply interface modifiers.
- Defender Actions: They act.
- Outcome & Repeat.
- Retries: Usually allowed at cumulative -1 skill per prior fail against that specific obstacle.
Hazards Lurking in the Code
- Detection & Trace: Defenders use Analyze/Search to find you and your physical location.
- Black ICE: Lethal automated defense sequences.
- Damage Program & Flatlining: Direct brain attacks on Total VR users. Resisted by HT (+3 for Hardened Decks). Can kill.
Your Core Hacking Toolkit (Program Overview)
!Blackhat_2.pngCheck individual wiki pages for full stats (Base Complexity, skill defaults, etc.).
- Alter (Single-Execution): Modifies data or programs subtly (e.g., change records, add backdoors to ICE). Changes are usually only noticed when they cause an effect, unless detected by Analyze.
- Analyze (Continuous/Single-Execution): Gathers information about a target (user, computer, program, file). Can detect modifications made by Alter, Spoof, or Stealth (Program) by winning a Quick Contest. Can be run continuously to monitor systems or scan for irregularities.
- Breach (Single-Execution): Your lockpick/battering ram. Penetrates a target ICE program. Requires winning a Quick Contest against the ICE. Must defeat all layers of Layered ICE to access the protected target.
- Control (Single-Execution): Takes control of a compromised computer or networked device (cameras, turrets). Allows the hacker to make the target perform its normal functions. ICE-protected systems must be Breached or Spoofed first.
- Damage (Single-Execution): Attacks hardware (causing crashes/damage) or, more dangerously, the mind of a VR-connected hacker (forcing HT rolls vs brain damage/incapacitation).
- ICE (Continuous): Defensive program. The fundamental firewall/guard. Blocks unauthorized actions unless Breached or Spoofed. Essential network defense.
- Jam (Continuous): Floods a target program (Analyze, Listen, Search) or comm channel with static, rendering it useless. Brute-force, not subtle – easily noticed.
- Listen (Continuous): Passively monitors data streams or network events. Used by defenders as a gatekeeper for ICE (can be Spoofed). Used by attackers to eavesdrop (must beat Stealth (Program); gets encrypted data as-is, requiring separate decryption like Code-Cracking from Action 2).
- Search (Continuous/Single-Execution): Actively looks for specific files, programs, or computers on a network. Must beat Stealth (Program) or Spoof in a Quick Contest to find hidden targets. Can be run continuously to scan for specific types of targets.
- Spoof (Continuous/Single-Execution): Feeds false information to Analyze, Listen, or Search. Used to masquerade as a legitimate user or hide actions (like making a breached ICE appear normal to Analyze). Can be detected if the target program wins a Quick Contest.
- Stealth (Program) (Continuous): Hides a user, program, computer, or data from Analyze, Listen, and Search. Opposing programs must win a Quick Contest against Stealth (Program) just to get any information at all.
- Trigger (Continuous): Defensive/utility program. Automates actions based on conditions set by the user (e.g., "If Listen detects password failure three times, Trigger system lockdown"). Doesn't require rolls itself; activates based on linked programs' results.
Practical Hacking Examples
- Opening an Electronic Lock: Connect to NAP -> Bypass Network/Computer ICE (Breach/Spoof) -> Access controlling Computer -> Use Control -> Command unlock.
- Breach vs. Spoof: Use Breach to disable ICE temporarily for actions it blocks. Use Spoof vs. Listen to slip past active ICE stealthily (if credentials are checked).
- Finding a File: Access Computer -> Use Search -> Beat Stealth (Program) if hidden (contest) -> Defeat file's ICE if any -> Use Control or Alter.
- Avoiding Detection: Run Stealth (Program) continuously (uses processing!). Combine with Spoof.