2K20: A Digital Resource for Cyberpunk 2020 [Articles]   [Rules]   [Gear]   [Lists and Charts]   [Cities]   [Scenarios]   [Campaigns]   [Other]   [Links]   [Evil Schemer]

What EVERY Netrunner Should Know...

Steps in Cracking a Datafortress

1. Library Research to determine little facts about the corporation. May come in handy.

1a. Load up a good selection of software. Neccessary applicatioons include one Decryption, one Intrusion, one Anti-ICE, one Protection, and a selection of utilities depending on the purpose of the intrustion, e.g. Viddy-Master for taking control of the computer controlled monitor system, Kneivel for controlling vehicles, etc. Reading and Copying files are functions of the Menu. Other programs like Demons, Daemons, Anti-Personnell and others are useful but the extremely lucky weefie-runner might survive a low-level datacrack without them.

Most programs require an activation and act once. Anti-ICE, Anti-Personnell, Decryption and Intrusion work once per activation. They may be activated again, but requires another action. Oter programs like Stealth and Protection and Demons are activated once and stay on until de-rezzed or deactivated.

2. Decryption vs. Codegate (Decryption Program Str+1d10 vs. Codegate Str+1d10). If successful, proceed to step 4. If unsuccessful, continue to step 3.

3. Intrusion vs. Datawall (Intrustion Program Str+1d10 vs. Datawall Str+1d10). If successful, proceed to step 4. If unsuccessful and unnoticed, try again. If unsuccessful and noticed, either a SysAdmin or an Anti-Personnell Program has been notified of your presence and will attempt to apprehend or discourage you, proceed to Combat!

4. Stealth vs. Detection (Detection Str+1d10 vs. Stealth Str+1d10). If successful, proceed to step 5. If unsuccessful, the Detection Program has notified either a SysAdmin or an Anti-Personnell Program to apprehend or discourage you, proceed to Combat!

5. Locate CPU and either run a Menu Command or operate a remote using the approprate utility. Often, CPU's contain further defenses that may need to be averted and step 4 or Combat! may need to be repeated.

Combat!
-------

1. Initiative:
Human Intelligence + Deck Speed + 1D10
Computer Intelligence (CPUx3) + 1d10

2. Winner declares first amd takes one action, then each successive highest result acts in descending order.

or, an optional rule that I prefer...

2a. Loser declares first, Winner acts first. Therefore, if an opponent is launches an Anti-Personnell Program towards the intruder, the intruder may either activate a suitable defense or take a chance and attack the opponent first.

2b. Combat Options:

    Intruder attacks ICE
      Anti-ICE Program Str + Intelligence + Interface vs.
      Program Str + Computer Intelligence (CPUx3).

    Intruder attacks SysAdmin or SysAdmin attacks Intruder
      Anti-Personnell Program Str + Intelligence + Interface vs.
      Protection Program Str + Intelligence + Interface

    Defending CPU attacks Intruder
      Anti-Personnell Program Str +
      Computer Intelligence (CPUx3) vs.
      Protection Program Str + Intelligence + Interface

    Defending CPU attacks Intruder's Cyberdeck
      Anti-System Program Str +
      Computer Intelligence (CPUx3) vs.
      Cyberdeck's Datawall Str + Protection Program Str + 1d10

4. Damage is allocated to affected systems or programs Strength (or Health in the case of Black ICE).


Contact   Top