Shadowrun Wiki

Hahns's Decking Cheatsheet

4119stron na
tej wiki
Dodaj nową stronę
Dyskusja0 Udostępnij

Ad blocker interference detected!

Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

All rolls are Computer + Hacking Pool (unless otherwise specified), opposed by System Rating with TN: Detection Factor, (unless otherwise specified).

The most important thing to know about decking is that it's always a balance between caution and time. While you want to be careful (make lots of skill checks), each time you make a check, you come closer to running out of time (security tally increases) So make the bare minimum amount of rolls that you have to.

Order of how to do a Decking Run Edytuj

1) Setup (mostly setting up barriers to being traced)

  • Find appropriate Jackpoint (Trace modifiers are based on this step)
  • Redirect datatrail as appropriate
  • Locate the Host in question
  • Decrypt and Enter host

2) Look around (Analyze the host) (most deckers skimp on this step, but it may bite you in the ass later)

  • Check out Security Ratings
  • Check to see if you are in a virtual machine
  • Check out worms
  • Look for snooping deckers, frames, or SKs

3) Look for your target

  • Browse for a file
  • Browse for a slave node
  • Evaluate for a file (if PLOT information or paydata)
  • Check to see if there is Scramble IC
  • Check to see if there is a Data Bomb
  • Check the log

4) Do what you need to do

  • Validate a passcode
  • Upload/download Paydata
  • Manipulate Slave node

5) Log off

  • Graceful Logoff

X) When the shit hits the fan

  • Defeat a Trace
  • Erase all the Passcodes
  • Cybercombat
  • Crash the Host
  • Jackout!

Things you do before the run Edytuj

Redirect your datatrail (making a "bounce" point)

  • TN: Control - Camo
  • Only one "bounce" per grid. Protects you from Traces, at potential cost of increased Security tally prior to run.

Look up "the yellow pages"

  • TN: Index - Browse
  • When you really need to find a phone number. The basic "Locate Host" operation.

Decrypt an access point

  • TN: Access - Decrypt
  • Only for encrypted access points

Log on to the Host

  • TN: Access - Deception

Things you can see during the run Edytuj

Look around at the scenery (Perception test)

  • Analyze X (IC, Icon, Security, Locate IC)
  • TN: Control - Analyze
  • Find out one piece of information about something, or find a runaway Trace IC.

Test Reality (Is this really real? Really?)

  • TN: Control - Analyze
  • Detecting if you are in a Virtual Machine

Look around for a person

  • Locate Frame or Decker
  • TN: System - Scanner

Find a specific place/item

  • Locate File, Access Node, Slave Node
  • TN: Index - Browse

Locate Paydata

  • Either the PLOT data or just money data
  • TN: Index - Evaluate

Look up "the yellow pages"

  • TN: Index - Browse
  • When you really need to find a phone number.

Get the Log file

  • TN: Control - Validate
  • To see who's logged on/off a system

Things that you can do to help the "things you can do" Edytuj

Get a User Passkey

  • TN: Control - Validate
  • Bonus: -2 to Logon to Host operations
  • Lasts until: Active Alert is triggered or 1d6 x successes in days
  • While mostly worthless, this can give on-site friends a valid access key
  • Allows you to Analyze, Graceful Logoff, Locate Icons, Send Data, Upload Data for free.
  • Some passkeys give you access to Files or Slave nodes.

Get a Superuser Passkey

  • TN: Control - Validate + 2
  • Bonus: Free access to all basic (non-restricted) Access, Index, and Slave operations
  • Lasts until: Active Alert is triggered or 1d6 x successes in days
  • Great for gathering intel about a system.
  • Also allows you to Crash Host, Disinfect, Dump Log, Tap Datastream/Commcall, Validate/Invalidate Account

Get a Supervisor Passkey

  • TN: Control - Validate + 6
  • Bonus: -2 to ALL system tests that are not specifically restricted
  • Lasts until: Active Alert is triggered or or 1d6 x successes in days
  • The moneymaker. Do this if you think you need it.

Create a Decoy

  • TN: Control - Mirrors
  • Result: Any time an attacker tries to affect you, roll 1d6. If below Decoy successes, then they attack the Decoy instead.

Things you can do during a run Edytuj

Tap someone's phone and eavesdrop

  • Tap Commcall, Retrain bandwidth
  • TN: Control - Commlink

Phone a friend

  • TN: Files - Commlink
  • Essential to maintain radio contact with the rest of the team.

Crash a program (or the Host)

  • AKA Going BSOD, Microsoft, the Bomb icon
  • TN: Control/Files/Slave - Crash

Download/Upload/Edit a file

  • TN: Files - Read/Write

Control a Slaved node

  • TN: Slave - Spoof

Things you can do to protect yourself Edytuj


  • TN: Control - Relocate
  • This "pauses" the Location cycle of a Trace. If you don't suppress the IC, then it picks up its trail next turn.
  • If you do not Graceful Logoff or eventually defeat the IC, you risk getting traced.

Destroy Worms

  • TN: Appropriate Subsystem - Disinfect
  • Note: You can only destroy worms that you have found with an Analyze Subsystem test

Trash the Passcodes

  • TN: Control - Validate
  • This removes the Superuser (Smartgun link) status of security deckers.

Heal Attribute Damage

  • Dice: Restore Program Rating
  • TN: Highest Attacker's Rating
  • Result: Repairs 1 damage per 2 successes
  • (Note: If it ever gets to the point where you need to heal, you're probably already screwed)

Heal Condition Meter

  • Dice: Medic Program Rating
  • TN: Light - 4, Moderate - 5, Serious - 6
  • Result: Each success repairs one "box". Medic degrades by 1 point.

How to end your run Edytuj

Graceful Logoff

  • TN: Control - Deception
  • Will end traces, no dumpshock


  • Dumpshock: Power equal to Security Value, Level equal to Host (Blue = L, Green = Moderate, etc.)
  • Cool decks: -2 power, -1 level
  • ICCM: -2 Power, -1 level
  • NOTE: When you jackout, any remaining traces have a chance of catching up with you. This is not much of a problem when you are on-site decking, but when you are in the comfort of your own livingroom, that's a problem. And dumpshock's ALWAYS a bitch.

Traces (or the thing you should really avoid) Edytuj

Hunt Phase:

  • Like typical cybercombat, except that Trace IC rolls against a TN equal to your Trace Rating
  • Trace Rating: Evasion - Trace IC Rating + # of bounce points + Camo Rating
  • (Not using optional "Bandwidth rule" at this time)

If the Trace EVER succeeds in a Hunt Phase test, then you go into the Location Phase. Location Phase:

  • Trace IC will find you in 10 - successes turns. There are three things you can do:
  • 1) Graceful Logoff (ends the trace immediately, but ends the run)
  • 2) Relocate (will "pause" the Trace IC for one turn. Can be "paused" indefinitely if suppressed)
  • 3) Locate IC, then Cybercombat (Trace IC will always attempt to evade in this situation)

Combat (or the OTHER thing you should really avoid) Edytuj


  • Evader's Dice: Evasion Rating (Use Cloak to reduce your TN)
  • Opposed by: Sensors or Security Value (Use Lock-On to reduce your TN)

Maneuver to Dodge

  • Each success equals +1 TN to hit you

Run Away! Run Away!

  • Each success equals 1 combat turn that you can escape

Maneuver to Strike

  • Each success equals -1 TN to hit or +1 to Power

Using simplified Combat Resolution TNs

  • All combat TNs are 4, plus/minus modifiers. Having a Supervisor password is like having a Smartgun Link (-2 TN)

Block/Parry an attack

  • Dice: Shield Program Rating
  • TN: Attacker's skill (Computer Skill or Security Rating)
  • Result: Subtract successes against attacker's successes. Shield degrades by 1 point.

Tricks to boost your detection factor Edytuj

  • Every 2 dice of Hacking Pool you allocate increases your Detection Factor by +1 (up to 6 dice/+3)
  • You can change the "mode" of your deck to increase your Masking by 50% and decrease another persona by 50%.
  • Get the highest rated Sleaze and Masking you can get your hands on.

Więcej w Fandom

Losowa wiki