New Hacking Items (Worms, Viruses, and Equipment)


Homebrew


1 person marked this as a favorite.

I shamelessly pirated some computer hardware and software ideas from Deus Ex and Star Wars to fit into my home game. Rather than just leave my notes, I thought I would share some of the ideas for people to kick around.

New Hacking Items

Since these are my notes, this also includes a conversation I copied from the forums about Critical Path Method that is pretty interesting and some adventure seeds I appropriated.

Here are the items (the notes contain a chart with levels, prices, bluk, capacity, and usage):

ARMAGEDDON VIRUS
Armageddon Virus instantly captures a module of DC 40 or lower. However, it also automatically starts a trace due to brute force hacking and activates countermeasures at the beginning of the following round.

BLACK OPS DATA BREAKER
Data breakers are common tools used by hackers to force their way into secure systems. Data breakers add +6 circumstance bonus to any Computers check made to hack computers, but they also add boost to any attempts to locate use of a data breaker in a computer system due to the “noise” these devices make. The check must beat the DC by an added +6 to avoid triggering countermeasuers. If the check beats the DC, but not the +6, the module is hacked but countermeasuers are also triggered.

BOTNET
Botnets utilize the Infonet-of-things to overwork a computer network with Denial of Service or SPAM. While being overwhelmed the network decreases the DC of all modules by 2.

COVERT SOFTWARE
Covert Software, like stealth software, must be declared used before attacking a module. It inhibits the security programs from detection intrusions. A roll must fail by more than 10 for countermeasures to detect the intrusion.

DATA BREAKER
Data breakers are common tools used by hackers to force their way into secure systems. Data breakers add +4 circumstance bonus to any Computers check made to hack computers, but they also add boost to any attempts to locate use of a data breaker in a computer system due to the “noise” these devices make. The check must beat the DC by an added +4 to avoid triggering countermeasuers. If the check beats the DC, but not the +4, the module is hacked but countermeasuers are also triggered.

DATASCAN
Datascan reveals all the Datastore and Secure Data Storage modules available on the current network.

DATA SPIKE
Data Spikes are limited use hacking rigs loaded with different tiers of hacking software. It uses its own bonus instead of the player’s computer skill. Tier 1 Data Spike (+5 Computers), Tier 2 Data Spike (+10 Computers),Tier 3 Data Spike (+15 Computers), Tier 4 Data Spike (+20 Computers), and Tier 5 Data Spike (+25 Computers). Data Spikes can only be used once.

DIGITAL LOCKPICK
Digital Lockpicks are limited use hacking rigs designed to break through common computerized locks. It uses its own bonus instead of the player’s computer skill. Tier 1 Digital Lockpick (+10 Computers), Tier 2 (+15 Computers),Tier 3 (+20 Computers), and Tier 4 (+25 Computers). Digital Lockpicks can only be used once.

FORTIFY SOFTWARE
Fortify is a cutting edge anti-virus program, when run increases the DC of the user's system by 2 against intrusive software like viruses and worms.

NANOPICK
Nanopicks are limited use items that release nanites into a mechanical lock. It uses its own bonus (+15 mechanics) instead of the player’s mechanic skill.

NUKE VIRUS
Nuke Virus instantly captures a module with a DC 25 or lower. However, it also automatically starts a trace due to brute force hacking and activates countermeasures at the beginning of the following round.

REVEAL SOFTWARE
Reveal Software removes the fog of war feature that covers several higher level networks, allowing you to see all of the available modules that you can hack.

ROOTKIT
When you make a successful Computers check to hack the system and beat the computer’s normal DC by 20 or more you gain root access. Rootkits reduce the need to beat the normal DC from 20 to 15. The advanced versions are very rare and reduced it to a 10. The effect last for 1 minute.

SPYWARE
Spyware installed on a network can leak Clearance information over a period of days. The installer of the spyware receives a +4 on any future attempts to hack the system.

STEALTH SOFTWARE
Stealth Software must be declared used before attacking a module. It inhibits the security programs from detection intrusions. A roll must fail by more than 5 for countermeasures to detect the intrusion.

STOP WORM
Stop Worm is a one time use software that stops a countermeasure from activating for 1 round.


I honestly do not see a need for this. Unless they are very expensive or single use I think many of them are too powerful.

My interpretation of the computer skill as used for hacking is that it already accounts for tools like you mention. I assume that your hacking toolkit, portable computer or even your comm link, has a set of personalized hacking tools stored on them. The hacking is done by selecting the right tools rather than typing at 10,000 word per minute.

Community / Forums / Starfinder / Homebrew / New Hacking Items (Worms, Viruses, and Equipment) All Messageboards

Want to post a reply? Sign in.
Recent threads in Homebrew
Starfield