Wednesday, June 26, 2013

Hacking the Matrix


Hacking: Digital Warfare

Your team of Cyber Knights may include characters skilled in Hacking the global Matrix.

Hacking Icons

Hacking the global Matrix requires an understanding of the basic iconography of the virtual world.

System Operations

Hack Network Firewall
The first step of a Matrix hack is to override the network firewall.
Hack Access Layer
The second step of a Matrix hack is to override the host's access protection layer.
Hack System OS
Once the access protection layer has been hacked, the System OS can be taken over.
Hack Network Stack
With control of the System OS a hacker can control and redirect the System's connections to the Matrix and other Hosts. The Network Stack can be accessed multiple times to redirect the connection between a group of Hosts.
Connect to Host
A hacker can use the Network Stack to move between Hosts. Once the Network Stack has been pointed at a valid Host, the Connect icon will appear.
Disconnect from Host
At any point during Matrix access, the user can disconnect. Hackers will try to disconnect without leaving behind a physical location or data trail.
Locate Paydata
Search through the System's folders and files looking for valuable data that could be sold on the open market.
Download Paydata
Retrieve selected data segments from the System.

User Apps

Run Decoy
Before hacking the System OS, a Hacker can launch a Decopy application to confuse Track and Trace threads.

Experience: Character Advancement

Your team of Cyber Knights gains experience (XP) while navigating the NBZ, dodging the law, completing contracts, hacking the Global Matrix, and fighting for their survival. Experience will train your gun hand, sharpen your reflexes, harden your body, sharpen your mind, and hone your skills. Experience is the currency of character advancement.

No comments:

Post a Comment