Author Unknown - Mindhack

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Mindhack

Computer hacking is a skill in its own right. Mindhack enhances the skill of the
hacker both by providing intuitive shortcuts (e.g. guessing the correct password from
25,000 possible combinations) and by forming a bridge to systems that are physically
impossible to reach by conventional means. Mindhackers may often not even be
consciously aware of their gift but will nonetheless have the reputation among their
peers as “elite” and as having a natural talent for hacking.

Using Mindhack

A Mindhacker adds his Mindhack Art level to his Computer Hacking skill when
attempting any feat of computer hacking, provided the system targeted is within the
range dictated by his Mindhack Strength level. Computer Hacking tasks can be either
unresisted, passively resisted or actively resisted.

Unresisted is where the system targeted is “out of the box”, with standard
configurations and such protections as are routinely supplied with it. Hackers take
such measures in their stride since their specifications are so widely known.

Passively resisted is where there has been an effort to provide further protection to the
system, in the form of either a sysadmin strengthening the security configuration or
the installation an “off-the-shelf” security product. Passive resistance allows for the
sysadmin or system owner to resist the hacking attempt using half his Intelligence +
Computer Hacking (or those of the creator in the case of a purchased security
product). Mindhack cannot enhance the effectiveness of passive resistance.

Actively resisted is where a sysadmin is actively using the system at the time that the
hacking attempt takes place. Firstly the sysadmin is entitled to a roll to resist the
hacker’s attempt to go undetected. If alerted, the sysadmin is then able to actively
resist all further efforts of the hacker and can even attempt to counterhack (i.e. trace
the hacker back to its source and/or compromise the system from which the hacking
attempt arose).

Of course, the sysadmin could just choose to switch off or disconnect the targeted
system, but there are times when this is not practical (e.g. a major government
database or finance system) and times when the sysadmin may be hoping to identify
the intruder by keeping him online. A sysadmin with Mindhack can add his Mindhack
Art level to his Computer Hacking skill level when resisting hacking attempts but can
only use Mindhacking to counterhack if the intruder’s home system is within the
range dictated by his Mindhack Strength level.
Mindhack Art Table

Task Success Level Mindhack


Required Strength required
Determining network address of remote computer One None
Determining approximate physical location of remote Two
computer
Determining exact physical location of remote computer Three
Cracking simple password (alphabetical only) Two
Cracking complex password (mixed character set) Three
Cracking lengthy access code/encryption Four
Penetrating firewall Five
Cracking military strength security/encryption Six
Accessing shared files One
Accessing unshared files Two
Installing remote program Three
Viewing remote screen and/or taking control of Three
keyboard and mouse
Gaining input from connected peripherals such as Four
microphone or webcam when not configured for such
access
Controlling remote printer, tape drive or similar Four
peripheral
Changing contents of remote database Two
Intercepting traffic to and from remote computer Three
Programming remote system Four
Not alerting active sysadmin to hacking attempt Two
Not leaving traces of hacking in system logs Four
Finding files by keyword or text search One
Finding files by subject, intent or user rather than by Three One
keyword or text search*
Finding remote computer by network identity or Two
contents
Finding remote computer by location or user identity* Four Two
Accessing computer with wired network connection or One
active modem
Accessing computer with wireless network connection Three
Accessing computer with inactive modem only* Five Three
Accessing computer with no network connection or Six Five
modem*
Switching on or off remote computer* Seven Six
Accessing computer with no network connection or Eight Eight
connection to mains power outlet*

*Requires one or more levels of Mindhack Strength


Mindhack Strength Table

Strength Abilities
1 Mindhack can only be used on a system that the character is physically
accessing.
2 Target system must be within the same room as character.
3 Target system must be within the same building as character
5 Target system must be within same town or city as character
6 Character can interface with a computer without the usual peripherals
(i.e. keyboard, mouse and monitor) if he is touching it
7 Target system must be within the same state, province or region as
character. Character can interface with a computer without the usual
peripherals if it is within the same room and he has a line of sight to it.
9 Character can interface with a computer without the usual peripherals
up to a range of 2 yards per point of Willpower and Mindhack
Strength, provided he has a line of sight to it.
10 Target system must be within the same country or continent as
character
12 Character can interface with a computer without the usual peripherals
up to a range of 10 yards per point of Willpower and Mindhack
Strength. Line of sight is no longer necessary.
15+ Target system must be on same planet and sephiroth as character

Using Mindhack Defensively

Mindhack can be used to resist the attempt of someone else to hack into a system that
the character is actively guarding. Otherwise it has no defensive application.

You might also like