Unscripted Hacking

>To do an unscripted Hacking run, ie Generic Data Gathering, System Sweeping, or to attempt to get some run data (blueprints, shift schedules or what ever) a player must pick a target system, describe how he is diving in, and use an appropriate programs from his deck. Your Hacking Pool serves two purposes in an Unscripted run, while it aids your dice rolls normally, it also represents your capabilities in the run. Once it runs out, you are forced to abandon your attempt and escape.

>Programs can reduce the system target number, but some may cause some feedback and result in a a trace point. Trace points are accumulative during the run and represent potential trouble that you have encountered in your run. These are resolved during the Escape Check.

>There are in general 3 checks for an unscripted run.

>Infiltration, Browse, Escape.

> Infiltration Checks are to gain initial access the system.
This check requires you to use a minimum of 1 Dice from your Hacking pool and you can use up to a maximum value equal to the program strength.

> Browse checks are to look through data files, to try and get something useful or control system features like doors, alarms or even turrets.
This check requires you to use a minimum of 1 Dice from your Hacking pool and you can use up to a maximum value equal to the program strength.

>Sometimes files may be protected in some way, these files will require that a Decker use a relevant program, or build one on the spot.

>The GM may also have certain IC protecting valuable information or system features. When Encountered, a Decker may load up up to his Memory in Programs to deal with that IC. This is resolved through normal Matrix Combat. If a Decker decides to Flee from the IC combat, Increase the Trace Number by 2, and go to the Escape check.

> Escape Checks are always used when jacking out to see if your deck took any addition damage from the attempt. This is against the system’s target number and is modified by +1 for any system traces you have picked up along the way. When you escape, you have two options, Resist the damage, or Evade it. Evading requires a number of successes greater then the current Trace value. While Resisting is a Damage resistance Test. Damage is always applied to your Deck first, then as Stun Damage to the Decker.

Infiltration Program Effect
MASKING Generic, No Target Number Mod
Attack -2 to infiltration Target Number, leaves a trace
Deception -1 to infiltration Target Number, leaves a trace
Sleaze -1 to infiltration Target Number
Browse Program Effect
SENSORS Generic, No Target Number Mod
Analyse -1 to target number, leaves a trace
Browse -1 to target number
Decrypt -2 to target number, leaves a trace
Evaluate -2 to target number, leaves a trace
Sift -3 to target number, leaves two traces
Escape Program Effect
BOD Generic, No Target Number Mod, Resists Damage like a normal resistance check.
Armor Like body, Gives -2 to target number, Can only be used with hacking dice.
EVASION Generic, No Target Number Mod, Avoids all potential damage. or takes all.
Slow Like Evasion, Gives -1 to target number, Can only be used with hacking dice.
Smoke Like Evasion, Gives -2 to target number, Can only be used with hacking dice.
Other Programs Effect
Shield Target Number 6, Protects vs 1 Damage Per success
Medic Target Number = Current Damage, Repairs 1 Damage per success
Mirrors Target Number 6, Buff, Roll twice take better result.
Relocate Target Number 6, -1 Trace for every two successes.
Restore Target Number 6, Restores 1 hacking pool per success, adds 1 trace.
System Description Base Target Number System Damage
Blue Personal PC, Minimal Security 4 L
Green Minor Company Server, Light Security 5 M
Orange Moderate Company Server, Medium Security 7 S
Red Major Company Server, Heavy Security 9 D
Successes Outcome
Critical Failure Failure, +2 to system trace, +2 to next target number
0 Failure, +1 to system trace
1 Partial Failure, -2 to next target number
2 Success
3 – 4 Success -1 to system trace
5 – 6 Success, -1 to next target number, -1 to system trace
7 – 8 Success, -1 to next target number -2 to system trace
9 + Success, -2 to next target number -2 to system trace

Unscripted Hacking

Shadowrun 2nd Ed. Taloswind Taloswind