Thursday, May 23, 2013

Improved Matrix System Phase 1


Hacking: Digital Warfare
Your team of Cyber Knights may include characters skilled in Hacking the global Matrix.
Hacking Icons
Hacking the global Matrix requires an understanding of the basic iconography of the virtual world.
System Operations
Hack Network Firewall
The first step of a Matrix hack is to override the network firewall.
Hack Access Layer
The second step of a Matrix hack is to override the host's access protection layer.
Hack System OS
Once the access protection layer has been hacked, the System OS can be taken over.
Hack Network Stack
With control of the System OS a hacker can control and redirect the System's connections to the Matrix and other Hosts. The Network Stack can be accessed multiple times to redirect the connection between a group of Hosts.
Connect to Host
A hacker can use the Network Stack to move between Hosts. Once the Network Stack has been pointed at a valid Host, the Connect icon will appear.
Disconnect from Host
At any point during Matrix access, the user can disconnect. Hackers will try to disconnect without leaving behind a physical location or data trail.
Locate Paydata
Search through the System's folders and files looking for valuable data that could be sold on the open market.
Download Paydata
Retrieve selected data segments from the System.
Run Decoy
Before hacking the System OS, a Hacker can launch a Decopy application to confuse Track and Trace threads.

User Apps

No comments:

Post a Comment