Jump to content
Sign in to follow this  

Network Encounter

Recommended Posts

So, I believe I have a decent grasp on how a network encounter works. But, I would like to ask y'all for verification and refinement. I'm asking for someone to write up how the encounter would go, action for action, if a hacker was hacking into the Haas Bioroid system that is shown in the Beanstalk book. I'm not looking for anything regarding advantage or threat or triumphs or despairs. For the sake of this request assume there is only the hacker and the sysop(defender). I want to see how it looks when the hacker breaks one of the subsystems that has 1 layer of ice as well as the sub that has 2 layers. No # of successes. Just the hacker either succeeds or fails and what a resulting action would/could be. Thanks.



Share this post

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this  

  • Create New...