Editing
ShadowRun.DnD5
(section)
Jump to navigation
Jump to search
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===ACTIONS IN THE MATRIX=== Agents Agents are semi-autonomous programs that can perform tasks and assist a decker within the Matrix. The user does not need to be log on itself to employ them but their limited AI means that they tend to be less affective (most tasks are performed at disadvantage when you are logged off). Agents roll their Initiative as a group and obey the users commands absolutely (no action required by you). They can perform almost any task that the Persona can with the correct programming. However they many only run a number of programs equal to their Intelligence modifier -1 (min 1). If sent out autonomy into other systems (as a group or individually) to perform their tasks. Dumpshock When you are forcibly ejected from the Matrix (via Matrix combat where you Persona was knocked to 0 Matrix Hit Points or when a Node crashed) or when you are knocked out of a drone or vehicle (either because it was destroyed or hacked) you experience dumpshock. If any of these conditions are met make a DC15 Intelligence save. Success means you gain the Reeling conditions and recover normally against a base DC12. Failure results in you gaining the Stunned condition for 1 minute (10 rounds). After that you lose the Stunned condition but gain the Reeling conditions instead. You recover from the Reeling condition as normal but the DC15. Hacking a System When one attempts to hack a Matrix system to sleaze past security IC, by-pass a security lock, take over an enemy drone or vehicle or security system, the system must be hacked. There are two ways to do this – try to sneak pass the security protocols or smash through them. Hacking drones and physical locks… For Drones and Security systems (often controlled by Spyders) a decker or rigger can attempt to seize control of it. They must first get pass the Firewall, either by using a rigger’s VRC (vehicle rig control) cybernetic implant or a program such as Sleaze or Sneak to get past the Firewall. See Drone Hacking talent (pg. 67). To use Sleaze or Sneak the attacker tries to slip past its security system. The drone gets an Intelligence save plus it’s Firewall against the program rating. If it fails the attacker slips through and can use Exploit to seize control of it or Confusion to paralyze it or Crash to shut it down temporally (these are separate actions as normal). Security locks with Firewalls must be bypassed with either a security tool kit that matches the device (Maglock passkey to bypass a Maglock) with a skill check against the DC or wirelessly with a comlink against the same DC but with a penalty equal to the Firewall rating x4! In the Matrix… To sneak in the decker must by-pass the secure of the system with a program such as Sleaze, Sneak or Spoof. This is an Action with the systems Firewall rating acting as its Saving Throw bonus. A failed save means that you have slipped by the system and can now act as ‘user’. If the system successfully saves the decker has the option of trying to smash pass the IC or leaving as the system sends out alarms or risk being tracked and dumped out of the Matrix (depending on the system). No matter what she does the system’s Firewall will increase by 1 or more levels. Smashing through means the decker is going to attack the Firewall itself in order to disable it. She can then move into the secure area and act as an ‘intruder’. The Firewall has its rating times 10 in Matrix Hit Points. If the decker can crash or destroy the Firewall in one round the system will fail to recognize the breach until its base time to run identity checks, which automatically detects intruders. Within most secure areas (except maybe those of really low important areas) the owners will have IC running at all times past the Firewalls. This IC is use to detect non-users and intruders within it. Depending on the level of security these system run identity checks every 10 minutes for low-security (often called Blue level, the lowest level for security IC), 2 minute for mid-level security (Orange level, a moderate secure area with some sensitive or protective data is stored) and every 5 rounds (Red level, or very secure areas) and every round (Code Red, or ultra-secure areas). Generally speaking a system can also increase one or two levels when it detects a non-user and the Firewall rating increase by one for Red and two for Code Red alerts. When a system has been alerted to an intruder or non-user additional IC is activated. This is highly dependent on the Corp, its resources, the level of sensitivity of the area the decker is in, etc. Blue systems will normally alert personal of breach and raise its level of Orange in 1d6 rounds. Orange systems will activate Grey IC system to seek out intruders and either attempt to crash their Persona (bring it down to 0 Matrix Hit Points) or activate a Tracker program to find the decker’s meat body. Many corporations will also raise an Orange threat to Red in 1d6+2 rounds. Red systems will active IC (most are Grey but some MegaCorps will activate Black IC also) along with wageslave deckers themselves and automatically attempt a trace on the decker’s meat body. Code Red alerts are only found with the most paranoid of corps. There will be multiple levels of IC and deckers activated and Tracker programs used at once. ====Matrix Actions in Combat==== For Matrix combat your Initiative is your Intelligence Modifier and if you are proficient with Initiative you also add your Proficiency bonus. Your Attack roll is your proficiency bonus + your Intelligence modifier. These can be altered by Programs. Some programs also require a saving throw. The basic save the DC is 8 + program rating (1-8) + your Intelligence modifier + comlink’s Firewall bonus. Your Persona may also have to make saving throws and gains your comlink’s Firewall bonus to all saves from the Matrix. Nodes and IC security and various Matrix systems all gain their Firewall rating as a bases for their saves unless otherwise noted. Remember while using hot-Emersion you have advantage on your Initiative checks and gain an extra action each round. This extra action can only be used for Matrix actions. These include Activating a Program, Attack, Disconnect, Dodge, Search and Scan Activating a Program: It takes an action to activate a program. Programs with duration of Instant must be active each time they are used. Their affects can be lasting. Those with a Duration require no concentration but must be reactivated to have it be back online. While a decker can have multiple programs up and running you cannot have two of the same programs with duration running at the same time. Programs with a Constant duration are active for as long as you remain in the Matrix. When you disconnect they all end. Attack: As above you make an attack check against any Persona, Icon, Program or System that you can see. Movement of Personas and programs is at the speed of light within the Matrix so range is irrelevant. If you succeed you deal your Matrix damage. Disconnect: As a full round action you can disconnect from the Matrix. This is safe but any Tracker programs or similar system searches still happen against your location until the start of your next round. You can disconnect as a basic action which automatically ends any such searches against you but you must make an Intelligence save against Dumpshock. Dodge: As an action you impose Disadvantage on all Matrix attacks against your Persona and you gain advantage against any Matrix program that imposes a save against you until the start of your next round. Search and Scan: As an action you can run either program within the Matrix or in the physical world to search for hidden comlinks and other systems or to shift through datafiles to search out specific information or to gather the intel of a datafile or program or corporate system.
Summary:
Please note that all contributions to RPGnet may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
RPGnet:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Navigation menu
Personal tools
Not logged in
Talk
Contributions
Create account
Log in
Namespaces
Page
Discussion
English
Views
Read
Edit
View history
More
Search
Navigation
RPGnet
Main Page
Major Projects
Categories
Recent changes
Random page
Help
Tools
What links here
Related changes
Special pages
Page information