Page 58 - World of Darkness
P. 58
Roll Results Example: Later, Greg tries to hack into the network of
Dramatic Failure: Your character has caused a sys- the city’s Department of Motor Vehicles. The DMV network
tem crash, interrupting any work in progress and forcing doesn’t have a sysadmin on duty, so the task is an extended
him to start his efforts from scratch. Data may be lost at roll. The network’s basic security software requires six
the Storyteller’s discretion. successes to be overcome, so Greg simply needs to keep
Failure: The task your character attempts to execute hacking at the system (and not suffer any dramatic failures)
does not go off properly or the database query he makes to get in.
returns no useful information.
Success: Your character’s function executes properly Roll Results
or his queries come back with the correct information. Dramatic Failure: A dramatic failure on the part of
Exceptional Success: Your character’s program or the hacker indicates that he’s been kicked out of the net-
function executes more quickly and efficiently than ex- work and can’t access it again for 24 hours. Worse, if a
pected. sysadmin contests the task, make another Intelligence +
Computer roll to determine if the admin manages to gain
Hacking the IP address of the hacker. A dramatic failure on the
Dice Pool: Intelligence + Computer + equipment part of the sysadmin indicates that the hacker brushes aside
versus Intelligence + Computer + equipment his efforts and penetrates the network automatically.
Action: Extended and contested (5-10+ successes; Failure: Your character does not succeed in making
each roll represents 30 minutes of programming) any headway in his effort.
Gaining root access to a network requires talent, cre- Success: Your character makes progress in his effort.
ativity and patience, and often results in a battle of wits Exceptional Success: Your character has found a
with the system’s administrator(s). Before the hacking vulnerability he can exploit against his opponent, giving
attempt begins, the Storyteller determines the network’s him a substantial advantage (as reflected in the number
level of security. If there is a system administrator on duty, of successes you achieve in one roll).
the hacking attempt is an extended and contested action. Suggested Equipment: High-performance computer
If the network is protected by basic security software alone, (+1 to +3), broadband Internet access (+1), disk of scripts
the task is simply an extended action. (+2), system passwords (+3)
In a contested and extended action between hacker Possible Penalties: Outdated computer system (-2),
and sysadmin, roll Intelligence + Computer + any equip- slow Internet connection (-3)
ment modifiers for both participants. The winner is the
first to accumulate the required number of successes. The Crafts
hacker needs to accumulate a number of successes equal
to the network’s basic security setup. This can be any- Howard pressed the carving tool gently against the
where from five to 10 based on the sophistication of the smoothly spinning wood, shaving off a steady curl of pine
network. The sysadmin needs to accumulate a number of with the whispery, scratching sound that he once loved. He
successes equal to the hacker’s Intelligence + Computer. hadn’t been down in his workshop since Angela died. He’d
If the hacker wins, he gains unfettered access to the net- forgotten how much he enjoyed working with his hands.
work. If the sysadmin wins, he kicks the hacker out of the He heard the basement door open, and Martha’s voice,
network and can block any further attempts from that heavy as lead, sank down the stairs. “Dad? What are you
invader that day. doing down there?”
Example: Greg is hacking into the network of a local “Just a quick project, hon,” he called back over his
financial group, which is protected by an on-duty sysadmin. shoulder. “Should be done in a few more minutes.”
Greg’s Intelligence is 4, his Computer is 3 and he’s using an
average computer setup (no bonus dice). The sysadmin’s “Okay. Listen… I’m going to start cleaning out mom’s
Intelligence is 3, his Computer is 3 and he’s using a decent stuff. I could use some help.”
system that gives him a +1 modifier. The network’s basic Howard put down the carving tool and switched off the
security software requires seven successes to be overcome. lathe. He tried to keep his voice even. “I’ve got to go out for
The sysadmin also needs to accumulate seven successes (the a while today. Can it wait till I get back?”
total of Greg’s Intelligence + Computer). The first rolls net Not waiting for an answer, he undid the clamps and
three successes for Greg and two successes for the sysadmin. pulled the chair leg from the lathe. The end was now tapered
Greg needs to gain four more successes to make it past the to a fine, strong point.
sysadmin and gain access, while the sysadmin needs to
accumulate five more successes to kick the intruder out of his Crafts represents a character’s training or experience
network. in creating works of physical art or construction with his
hands, from paintings to car engines to classical sculp-
If the network is protected by basic security software ture. Characters possessing this Skill typically have the
alone, the hacker needs to accumulate a number of suc- knowledge, but not necessarily the tools or facilities to
cesses equal to the network’s basic security setup, as above.
make use of their capabilities. A character might be an
57
MENTAL SKILLS- COMPUTER-CRAFTS

