Hacking:
Digital Warfare
Your team of Cyber Knights
may include characters skilled in Hacking the global Matrix.
Hacking Icons
Hacking the global Matrix
requires an understanding of the basic iconography of the virtual world.
System Operations
 |
Hack
Network Firewall
The first step of a Matrix hack is to override the network firewall.
|
|
Hack
Access Layer
The second step of a Matrix hack is to override the host's access protection
layer.
|

|
Hack
System OS
Once the access protection layer has been hacked, the System OS can be taken
over.
|

|
Hack
Network Stack
With control of the System OS a hacker can control and redirect the System's
connections to the Matrix and other Hosts. The Network Stack can be accessed
multiple times to redirect the connection between a group of Hosts.
|

|
Connect
to Host
A hacker can use the Network Stack to move between Hosts. Once the Network
Stack has been pointed at a valid Host, the Connect icon will appear.
|

|
Disconnect
from Host
At any point during Matrix access, the user can disconnect. Hackers will try
to disconnect without leaving behind a physical location or data trail.
|

|
Locate
Paydata
Search through the System's folders and files looking for valuable data that
could be sold on the open market.
|

|
Download
Paydata
Retrieve selected data segments from the System.
|

|
Run
Decoy
Before hacking the System OS, a Hacker can launch a Decopy application to
confuse Track and Trace threads.
|
User Apps
Comments
Post a Comment