Difference between revisions of "SR5:Hacking Lists"

From Shadowrun Wiki
Jump to: navigation, search
(Noise)
(Noise)
 
(6 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
{{SR5:List Navigation}}
 
{{SR5:List Navigation}}
<center>
+
 
{|
+
{|class="wikitable" border="1" style="text-align:center;background:gray;color:white;"
|
+
|+style="color:black;"|DEVICE RATINGS
{|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;"
+
!style="background:black;color:gold;"|DEVICE TYPE
|+style="color:black;"|FREE ACTIONS
+
!style="background:black;color:gold;"|RATING
|-
+
!style="background:black;color:gold;"|EXAMPLES
!style="background:black;color:gold;"|ACTION
 
|-
 
|Load Program
 
|-
 
|Switch Two Matrix Attributes
 
|-
 
|Swap Two Programs
 
|-
 
|Unload Program
 
|}
 
|rowspan="4"|
 
{|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;"
 
|+style="color:black;"|COMPLEX ACTIONS
 
|-
 
!style="background:black;color:gold;"|ACTION
 
!style="background:black;color:gold;"|FUNCTION
 
!style="background:black;color:gold;"|LIMIT
 
|-
 
|Brute Force||Mark Manipulation||Attack
 
|-
 
|Check Overwatch Score||Information Gathering||Sleaze
 
|-
 
|Crack File||File Manipulation||Attack
 
|-
 
|Crash Program||Matrix Combat||Attack
 
|-
 
|Data Spike||Matrix Combat||Attack
 
|-
 
|Disarm Data Bomb||File Manipulation||Firewall
 
|-
 
|Edit File||File Manipulation||Data Processing
 
|-
 
|Enter/Exit Host||Misc||Data Processing
 
|-
 
|Erase Mark||Mark Manipulation||Attack
 
|-
 
|Erase Matrix Signature||Mark Manipulation||Attack
 
|-
 
|Format Device||Device Manipulation||Sleaze
 
|-
 
|Grid-Hop||Misc||Data Processing
 
 
|-
 
|-
|Hack on the Fly||Mark Manipulation||Sleaze
+
|Simple
 +
|1||General appliances, public terminals, entertainment systems
 
|-
 
|-
|Hide||Misc||Sleaze
+
|Average
 +
|2||Standard personal electronics, basic cyberware, vehicles, drones, weapons, residential security devices
 
|-
 
|-
|Jam Signals||Misc||Attack
+
|Smart
 +
|3||Security vehicles, alphaware, corporate security devices
 
|-
 
|-
|Jump Into Rigged Device||Misc||Data Processing
+
|Advanced
 +
|4||High-end devices, betaware, military vehicles and security devices
 
|-
 
|-
|Matrix Perception||Information Gathering||Data Processing
+
|Cutting Edge
 +
|5||Deltaware, credsticks, black-ops vehicles and security devices
 
|-
 
|-
|Reboot Device||Device Manipulation||Data Processing
+
|Bleeding Edge
|-
+
|6||Billion-nuyen experimental devices, space craft
|Set Data Bomb||File Manipulation||Sleaze
 
|-
 
|Snoop||Information Gathering||Sleaze
 
|-
 
|Spoof Command||Device Manipulation||Sleaze
 
|-
 
|Trace Icon||Information Gathering||Data Processing
 
 
|}
 
|}
|-
+
==Noise==
|
 
{|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;"
 
|+style="color:black;"|VARIABLE ACTIONS
 
|-
 
!style="background:black;color:gold;"|ACTION
 
!style="background:black;color:gold;"|FUNCTION
 
!style="background:black;color:gold;"|LIMIT
 
|-
 
|Control Device||Device Manipulation||Data Processing*
 
|-
 
|Matrix Search||Information Gathering||Data Processing
 
|}
 
*Control Device may or may not use Data
 
Processing as its limit
 
|-
 
|
 
{|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;"
 
|+style="color:black;"|SIMPLE ACTIONS
 
|-
 
!style="background:black;color:gold;"|ACTION
 
!style="background:black;color:gold;"|FUNCTION
 
!style="background:black;color:gold;"|LIMIT
 
|-
 
|Change Icon||Misc||Data Processing
 
|-
 
|Jack Out||Misc||Firewall
 
|-
 
|Invite Mark||Mark Manipulation||Data Processing
 
|-
 
|Send Message||Misc||Data Processing
 
|-
 
|Switch Interface Mode||Misc||Data Processing
 
|}
 
|-
 
|
 
{|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;"
 
|+style="color:black;"|INTERRUPT ACTIONS
 
|-
 
!style="background:black;color:gold;"|ACTION
 
!style="background:black;color:gold;"|FUNCTION
 
!style="background:black;color:gold;"|LIMIT
 
!style="background:black;color:gold;"|INIT COST
 
|-
 
|Full Matrix Defense||Matrix Combat||Firewall||-10
 
|}
 
|}
 
</center>
 
 
 
==Technomancer Actions==
 
 
<center>
 
<center>
 
{|
 
{|
 
|
 
|
{|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;"
 
|+style="color:black;"|SIMPLE ACTIONS
 
|-
 
!style="background:black;color:gold;"|ACTION
 
|-
 
|Call/Dismiss Sprite
 
|-
 
|Command Sprite
 
|}
 
|
 
{|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;"
 
|+style="color:black;"|COMPLEX ACTIONS
 
|-
 
!style="background:black;color:gold;"|ACTION
 
|-
 
|Compile Sprite
 
|-
 
|Decompile Sprite
 
|-
 
|Erase Resonance Signature
 
|-
 
|Kill Complex Form
 
|-
 
|Register Sprite
 
|-
 
|Thread Complex Form
 
|}
 
|}
 
</center>
 
 
==Noise==
 
<center>
 
 
{|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;"
 
{|class="sortable wikitable" border="1" style="text-align:center;background:gray;color:white;"
 
|+style="color:black;"|NOISE AND MATRIX USE
 
|+style="color:black;"|NOISE AND MATRIX USE
Line 191: Line 67:
 
|Wireless negation (e.g., wallpaper or paint)||Rating
 
|Wireless negation (e.g., wallpaper or paint)||Rating
 
|}
 
|}
 +
|
 +
{|class="wikitable"
 +
|+SPAM AND STATIC ZONES
 +
!SPAM ZONE!!STATIC ZONE!!NOISE RATING
 +
|-
 +
|City downtown
 +
|Abandoned building
 +
|1
 +
|-
 +
|Sprawl downtown
 +
|Abandoned neighborhood, barrens
 +
|2
 +
|-
 +
|Major event or advertising blitz
 +
|Rural area, abandoned underground area, heavy rain or snow
 +
|3
 +
|-
 +
|Commercial area in a city
 +
|Wilderness, severe storm
 +
|4
 +
|-
 +
|Commercial area in a sprawl
 +
|Remote place with satellite access only
 +
|5
 +
|-
 +
|Massive gathering or during widespread emergency
 +
|Remote, enclosed place (cave, desert ruin)
 +
|6
 +
|}
 +
|}
 +
 
</center>
 
</center>

Latest revision as of 19:45, 3 April 2016

5th Edition Lists
Gear // Magic // Hacking // Skills // Qualities // Packs // Creatures
DEVICE RATINGS
DEVICE TYPE RATING EXAMPLES
Simple 1 General appliances, public terminals, entertainment systems
Average 2 Standard personal electronics, basic cyberware, vehicles, drones, weapons, residential security devices
Smart 3 Security vehicles, alphaware, corporate security devices
Advanced 4 High-end devices, betaware, military vehicles and security devices
Cutting Edge 5 Deltaware, credsticks, black-ops vehicles and security devices
Bleeding Edge 6 Billion-nuyen experimental devices, space craft

Noise

NOISE AND MATRIX USE
PHYSICAL DISTANCE TO TARGET NOISE LEVEL
Directly connected (any distance) 0
Up to 100 meters 0
101-1,000 meters (1 km) 1
1,001-10,000 meters (10 km) 3
10,001-100,000 meters (100 km) 5
Greater than 100 km 8
SITUATION NOISE LEVEL
Dense foliage 1 per 5 meters
Faraday cage no signal, action blocked
Fresh water 1 per 10 cm
Jamming 1 per hit on Jam Signals actions
Metal-laced earth or wall 1 per 5 meters
Salt water 1 per centimeter
Spam zone or static zone Rating
Wireless negation (e.g., wallpaper or paint) Rating
SPAM AND STATIC ZONES
SPAM ZONE STATIC ZONE NOISE RATING
City downtown Abandoned building 1
Sprawl downtown Abandoned neighborhood, barrens 2
Major event or advertising blitz Rural area, abandoned underground area, heavy rain or snow 3
Commercial area in a city Wilderness, severe storm 4
Commercial area in a sprawl Remote place with satellite access only 5
Massive gathering or during widespread emergency Remote, enclosed place (cave, desert ruin) 6