Professional Documents
Culture Documents
1
HACKING
1
Hacking E rrata
Hacking
The basic principle of this hacking system is to of every computer in the human system. Unthinkable
provide fun mechanics, enabling players to create complexity. Lines of light ranged in the non-space of
Hacking E rrata
characters who hack computer systems. the mind, clusters and constellations of data. Like city
lights, receding…” William Gibson
Summary
The basic system of hacking uses the Dark Stars In Dark Stars, a virtual interface has been
standard d100 skill check, the player chooses created and re-created countless time by hackers,
a hacking skill, a program and rolls their d100 programmers and AIs to segment, distil and
for each degree of success the player adds 1 to dissect the total gamut of human knowledge and
the strength of the program. The hacking skills experience. Lost in the vastness of connected
are computer science, computer engineering computers are islands created by individuals
and profession hacking. Computer operation is who hold dominion over their territory through
a useful skill that all children are taught but it passcodes and ancient cyphers, hardware neural
does not give enough background information imprint or DNA-scanning firewalls. Information
to hold a career in cyber security operations, so can be locked away and stored. Travel through
computer operation does not add to the Strength the Net is fast - really fast - because any point is
of a program when multiple degrees are achieved connected to another. You simply step outside
instead it will enable the user to receive some your castle and you are at the door of your
other benefit like shorter time on a task, more enemies. Travelling through the data fortress is
information retrieved, better understanding of the dependent on the obstacles you encounter.
results of the computer task. If the person doesn’t have any Intrusion
Computer programs have a strength, this Countermeasures (ICE) then you blast through
determines how much “damage” is required to or knock on their “door” and you get into their
unload them from the hackers cyberdeck or system, and their head, where you can rummage
computer, the general effectiveness of the program around, looking for vital intel. Depending on
and the amount of memory space it takes up. Each the complexity of the system being broken into,
program has one or more ability, and this is used you may or may not need to have a physical grid
to determine what it can do. Sample programs layout of the place. This layout can be anything
are provided in this erratum to enable GMs and the designer imagines. Travel between unoccupied
Players to better understand how to create them. squares is instant.
The previous rules are re-printed here so it can act
as a handy addendum to any group using hacking
systems.
The Net
“Cyberspace. A consensual hallucination experienced
daily by billions of legitimate operators, in every nation,
by children being taught mathematical concepts… A
graphic representation of data abstracted from banks
2
Hacking Rules PS of programs they run or to a specific skill like
pilot drones or sensor operation.
Hacking uses programs, computers and operators.
Hacking in Dark Stars takes place in the normal Program Stats
Hacking E rrata
combat sequence.
Programs have the following stats.
PUs and Computers
The CPUs are the primary component of Program Strength
computers. Strength is the program’s primary stat, used for
damaging and destroying the program. When
PS attacking the program Strength is similar to hit
Each strength point of the CPU allows one points. When a program deals damage or has an
program strength, PS, to be run. Reducing the PS effect, the result is typically based on its Strength.
of a CPU to zero allows the hacker to take control
of that CPU. The typical PS for silicon CPUs is 1, Ability
while the typical PS for neural systems is 6. You An ability the program performs, for instance,
can transfer data at a rate of 1 MU (Memory Unit) using a camera, shooting a weapon, providing a
per strength of the CPU. bonus, or damaging a program.
Special Bonuses
Some CPUs are designed to give a special bonus to
3
Using a program per ability to purchase from either commercial
sources or a hacker.
Add the program Strength to the character’s skill
and make a normal task roll. For each degree of Multiple People
Hacking E rrata
success, the program will have an effect based on By working together, multiple people can easily
its ability. create a program. For every two programmers
added, the time gets reduced by half.
System Tunneling
Operating Systems
When using computers to hack a target system The Operating System (OS) is often a very large
it is possible to use multiple linked computers to and powerful program used to interface between
provide extra protection against counter-intrusion. programs and the hardware that houses them.
The drawback to this extra protection is that the Operating systems have been very optimised,
hacker’s signal is slowed down by having to route only taking up 1 MU per 100 Strength of the
through another set of CPUs. For each computer OS. It is possible to simply attack the Operating
in front of the computer you are using to hack the System before the hardware, and thus control the
target you get a penalty of -1 SI. In order to attack hardware itself. This is why commercial Operating
Systems are so strong. Operating Systems do not
the system you are using, the counter-intrusion add their Strength to the programs that run on
attempts must first defeat the fire walls of each them.
computer system you are tunnelling through.
Costs of Programs
Acquiring Programs
The costs of programs are determined by their
A starting character who has a cyber deck can Strength. For smaller programs, the cost is quite
acquire programs of Strength 1 (one) for 50 credits cheap. A cumulative accrual system is used to
per program. These programs are not source code determine the cost of a program; simply add all the
but pre-created programs. A character doesn’t lower Strength values together.
need to be a hacker to run these programs. Use the
equipment list to purchase other programs. For example, to calculate the cost of Kill 12:
Hacking E rrata
6-10 CR2,000
11-20 CR10,000 This is a simple program to compress data and
21-30 CR50,000 programs. Programs take up one quarter of the
space and one tenth of data.
31-40 CR200,000
41-50 CR1,000,000 Repair
51-60 CR5,000,000 This program restores 1d6 of PS to another
61-100 CR20,000,000 program.
New Hacking Program her new colony world. She has a portable sensor
array to work with. A portable sensor array with
Overcharge a sensor rating of 4 cannot detect incoming ships
until they are right on top of it, 5km meters away.
This program changes the current flow in
If it had a sensor rating of 5, it could detect them
hardware. Overcharge can simply cause
at one range band out, 25km meters, 6 it could
capacitors to store power and explode, causing
detect them at 150km, 7 it could detect them at
damage to the hardware’s SP. Overcharge can
500km out. The hacker decides to overcharge the
be used to increase the power output of sensors,
sensor array which has a total SP of 50 because of
motors, engines, weapons, or other whole vehicle
its rugged construction. She overcharges it from
system. The Strength of the Overcharge program
4 to 7 because she has a program that is Strength
determines the damage done to the component
3. This increases the Sensors by 60%, 2.4 which is
or vehicle and the effect on the system. For
rounded up to 3, or for a total of 7. The systems
each point of Program Strength 1 point of SP is
when over charged takes 3 points of Damage
inflicted to the SP of a component or vehicle, and
every 10 days.
for each 4 points 1d6 is inflicted on the SP of the
component or vehicle either every round, hour, Example Gravitic Drive Over Charge
day, 10 days, or month depending on the GMs Ronald’s space taxy has a high paying fair
discretion. For each 1 point of Program Strength tomorrow, he needs to meet the ship at Saturn
the systems effectiveness is increased by 20%, with his fair on time for a big payoff. He calls
round up. If extra damage is dealt to a component his hacker friend Mitch and asks for his gravitic
or cybernetic component the remaining damage engines to be overcharged. Mitch works his
is dealt to the next component in the location magic overcharging the engines using his
or the location in general. When weapons are Speeder-Special build of the Overcharge code
overcharged both their damage and penetration which has a program Strength of 10. This will
is increased but doing so deals double damage increase the speed of the engine by 200%. The
and each use of the weapon will cause it to take engine has a speed of 2AU per 10 days, so its
this damage. increased by 4AU per 10 days, for total of 6AU
Example Sensor Over Charge per 10 days. Saturn is 8 AU from mars, still not
quick enough. He needs to make his Program
Hacker Judy wants to detect incoming ships to
Strength 20, he happened to be working on that
6
version, compiles it and runs it. 16AU in 5 days. damage enough to shut it down.
The ships engines will take 5d6 per day. The
Engines have 100 SP each, so he may blow up the Sample Programs
engines, but each one will take individual damage,
The following list of sample programs should
Hacking E rrata
on average he deals 20 damage per engine, he may
get there but that taxi is going to be wrecked. show GMs and players how to construct new
programs from the abilities list.
Example Overcharge Cybernetics to destroy them
Like all items, programs should be recorded on
Hacker Bob has had it with his neighbor. He
the character sheet.
decides to wreck his eyes. He runs overcharge
2, dealing 2 SP to each cyber eye. After breaking From the Dark Stars rule book, this is two of the
through the firewalls, he can overcharge each eye. computers and some programs.
Each eye takes 2 damage from the overcharge.
2 Damage is carried over to the head of his
neighbor.
Example Overcharge Weapon
Trud has a power armour suit, that has a rail
gun a weapon using large amounts of electronics
and energy to fire. She overcharges her rail gun
using overcharge 4 increasing its damage by 80%.
The gun normally deals 6d6+12. When damage is
rolled increase it by 80%, she rolls 37, that is 29.6
(round 30), 30+37 is 67. Penetration is normally
90, so that is increased by 80% too. That totals
162. She shoots at a tank for tank for 67 damage
with 180 penetration tearing through the armour
and damaging its locomotion by shooting out the
grav engine. The gun takes 2d6 damage, it has 40,
after rolling for damage it has 30 left, maybe 6
shots if she is lucky.
Tackle
The effect of this program is to stop a program or
operator or hacker from moving in Cyberspace.
The tackle latches on and stops them using their
ability to move. Only by destroying the tackle can
the hacker move again freely.
Example
Hacker Judy is spotted by a modified Doberman,
it latches on using its tackle ability and Judy
cannot move. Its tackle only has strength one,
but the daemon has a total Strength of 5 so Judy
launches a kill 2 at the Doberman dealing 5
7
CPU Table
The CPU Table is used to determine attributes of
existing Dark Stars computers in the equipment
Hacking E rrata
8
9
Hacking E rrata
ITEM BULK SP RUNNING TIME HOURS COST CR
WORKSTATION COMPUTER 50 45 2 1,000
POWER PC 100 60 4 6,000
AI PC 40 30 1 160,000
Hacking E rrata
ALARM PROGRAM PS 1 0 0 0 50
DETECT PS 1 0 0 0 50
SHIELD PS 1 0 0 0 50
KILL PS 1 0 0 0 50
DAEMON PS 1 0 0 0 50
COPY PS 1 0 0 0 50
ARCHIVE PS 1 0 0 0 50
OVERCHARGE 1 0 0 0 50
TACKLE 1 0 0 0 50
REPAIR PS 1 0 0 0 50
STEALTH PS 1 0 0 0 50
HACKING SYNERGY PS 1 0 0 0 50
HACKING INTERFERENCE PS 1 0 0 0 50
SKILL PROGRAM PS 1 0 0 0 50
10 HARDWARE INTERFACE PS 1 0 0 0 50
USE
A large computer with three CPUs giving it 3 PS CPUs, 10 WS fi rewall, 4 MU storage.
A large computer with ten CPUs giving it 10 PS CPUs, 10 WS firewall, 5 MU.
A large computer with three Neural Processors 18 PS CPU, 50 WS fi rewall, 10 MU and lots of
Hacking E rrata
memory.
This item consists of a monocle worn over the eye and a small cassette-sized computer. 1 PS CPU, 5
WS fi rewall, 2 MU storage, Optional speakers, video boards, keyboard and mouse, power supply.
This computer can be used to view and record multimedia information. The computer is cheap and
can be used for accessing the net, network gaming (though not very graphically intensive games) and
projecting media onto walls. A computer engineer can modify the IPOD to enable it to perform any
computer functions though at a -20% penalty. 1 PS CPU, 3 WS firewall, 1 MU storage.
An option to increase the MU of a Cyberdeck or Computer by 1, takes up one option
A keyboard for providing an interface to programs.
A touchpad or mouse for connecting to the machine
An inbuilt touchscreen for using the device and viewing whats on the device.
An audio system to output sounds from the computer or options.
Connect your Screen, Keyboard and Touch Pad or other Peripherals to your deck or computer.
A special option for cyber decks and computers, provides 1 MSU/MU and 1 PS Strength CPU
specifically for running daemons, adds one to the Program Strength of the daemon
An extra CPU 5 PS Strength CPU, Speed 2 CPU, each CPU added past the first extra costs double the
last cost of CPUs, see example.
Install A cyberupgrade in your deck or computer that is Chip, Small or Medium sized. Can hold 4
Chips and either 2 Small or 1 medium Cybernetic Option
A special cutout which disconnects the net saftly from the cyberdeck and powers it down slowly
sending a signal up the link to the user to disconnect.
A special dataport which provides a second firewall with a PS of 25 in adition to the Cyberdecks
firewall.
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section
See Hacking Section 11
New Programs
Note all of these programs except the overcharge
and tackle programs can be made from the base
Hacking E rrata
abilities.
ITEM BULK SP RUNNING TIME HOURS COST CR
TRACKER PS 3 0 0 0 600
DOBERMAN PS 5 0 0 0 1,150
LINEBACKER PS 9 0 0 0 2,750
RAGNAAR PS 12 0 0 0 7,200
KRAKEN PS 21 0 0 0 5,350
JESSY PS 6 0 0 0 1,650
ARNOLD PS 9 0 0 0 2,700
PERIMETER PS 25 0 0 0 13,850
12
Hacking E rrata
USE
Alarm Strength 1, Detect Strength 2
Alarm Strength 1, Detect Strength 2, Daemon 2. Launches both alarm and Detect and can move
around the net guarding the computer system that it runs on.
Shield 1, Repair 1, Detect 2, Tackle 1, Daemon 4. A program that shields the hacker and other
programs by detecting incoming threats and using shield and repair.
A powerful Kill program with Kill 6. It has an icon of a big axe and the hacker or program using it
looks like they are chopping programs with it.
A Viking Chieftain wielding a Battle axe. Battle Axe Program (Kill 6), Daemon 3, Shield 2, Detect 1.
Detects incoming threats or can be told to deal with incoming threats from other friendly programs
using its Kill 6 battle axe. Can also be told to chop down firewalls.
Copy 3, Archive 2. A program designed to copy data and file it efficiently.
Copy 1, Archive 2, Stealth 3, Daemon 3. A program that pretends to be a normal system resource or
different administrator, it uses its stealth to hide around looking for things to copy for its master and
archives them.
Stealth 2, Shield 2, Kill 3, Tackle 5, Detect 4, Daemon 5. This monster of a program uses its detect to
find a hostile hacker or program, uses its stealth to sneak up on them and its shield to protect itself its
tackle to stop them moving and then its kill program to defend itself or kill the target.
Hacking Synergy 2, Repair 2, Daemon 2. This program runs Hacking Synergy providing a 10% bonus
to Smart Weapon attacks, if it gets destroyed it repairs itself and it and run Hacking Synergy on two
targets at once. Jessy Quotes phases from the popular commentator and Actor from the 1980s and
1990s.
Hacking Interference 2, Repair 2, Kill 2, Daemon 3. Arnold interferes with smart gun attacks while
quoting phrases from the popular 1980s and 1990s actor.
Hacking Interference 2, Hacking Synergy 6, Repair 2, Kill 2, Detect 6, Alarm 1, Daemon 6. This
program creates a perimeter around the group of charters, and defends them provides hacking Synergy,
detects incoming threats sounds the alarm, repairs itself or firewalls, interferes with 2 enemies at a time
and provides hacking synergy smart gun bonuses of 10% to up to 6 people.
Hardware Interface 2, Detect 1, Stealth 1, Daemon 3. This program stealthily seeks out cameras
connects to them then allows the hacker to control and use those cameras. It can be easily modified to
see out different hardware so there is Door Man, Light Man etc.
Stealth 6, Detect 6, Kill 2, Repair 2, Shield 2, Alarm 1, Daemon 6. Keymaster is a stealthy program that
attempts to get keys by using kill and then repairing the firewall damage after its done, by operating
using stealth its usually difficult to detect. It uses detect to determine if it is found and then hides
coming back to finish the job of getting access keys to data. Once it has the data it returns, if it is found
out and detected it raises an alarm to alert other friendly programs or the hacker.
This overcharge program needs to be loaded into a vehicle with the proper access privileges
(permission to use the vehicle). It overcharges the engines, which ever type they are and increases the
speed of the vehicle by 120% 1d6+2 SP is inflicted to the engines, per day.
13
Hacking Clarifications and Errata
When hacking is used in Dark Stars it is handled success. This extra strength never counts for the
with the standard task resolution mechanics. total strength the CPU can run at.
Hacking E rrata
Programs have a Strength which needs to be Launching a program takes an action and a new
defeated in opposed tests, programs are destroyed program can be launched every action. Using
when they sustain their Strength or more in a program that is already running also costs an
damage. If a system is damaged or compromised, action. A high strength CPU can launch multiple
then other systems connected to it without their programs per action. For every 10-program
own firewalls can be hacked. For Hackers, they strength (round up) the CPU can launch 1
use a link and then their brain, so the brain is program or use one already running program. This
connected to the link. Brains do not have firewalls means that a CPU with 11 strength could launch 2
but have EGO. If the EGO of a brain is damaged programs in a single action.
(by a kill program) and if it ever reaches zero or
less the hacker is knocked out. Any further damage Movement takes 1 action regardless of the
is carried over to their general Hit points which distance, but programs and characters cannot
will continue until they die or are disconnected move through firewalls unless they have access
from their deck. The example illustrates this. codes, which can be got by destroying the firewall
Cyberbrains have their own firewall, so that is link or gaining the key in some other way.
firewall then cyber brain firewall then to the EGO Example: a CPU 1 will be able to run 1 program
of the AI or human inhabiting it. Ais have a default with a strength of 1. A Computer with 18 Program
ego of 10 if they do not have enough Charisma, Strength CPUs can run a total of 18 Program
Empathy, Intelligence or Self Control. Strength Programs at once and launch 2 programs
Hacking can also be very quick; an alternative per action. It can run programs up to strength 18.
system is Roll 10 under program strength to
Flood Protection
succeed or run the program. This is typically good
Pentabomb has a subsidiary company called
for programs not being run by hackers, just buy a
Comm Sec which co-ordinates the regulation and
big program. Using this system as opposed is quite
monitoring of all publicly accessible networks.
simple but the more complex method is better for
From Gravinet in the Block to Jovus Moons Data
hacker characters.
Links, Pentabomb is ready to act if widescale
Hackers can increase the strength of programs hacking attempts or exploits are discovered.
by getting more degrees of success on the roll to
For this reason, basic applications and firewalls
activate the program. For each degree of success,
always have flood protection. Network routers
the hacker adds one to the program strength which
and data links will not allow for example the use
does not rely on the CPU strength. This means
of 100 kill programs against one data linked data
that a skilled hacker can have a program running
lake or computer. These are stopped by a greater
at a higher strength than the CPU strength of their
number of Pentabomb computers running counter
current deck.
software. This does lead to the internet dropping
Example out or becoming less stable or slowing down.
Hacker using an PODO1 cheap computer with These Denial-of-Service attacks are usually dealt
only 1 CPU can run a stealth program and get with quickly and effectively by Pentabomb’s AIs.
a program strength of 6 by getting 5 degrees of The Collective has a similar system except its
14
built into every C-Link, the super AI Umath will only has two options so it can have 2 more giving
neutralise threats by re-tasking a fraction of the it a Strength of 16. These extra two CPUs cost
collectives computing power to stopping this type 2,000 more credits. A Power PC has a Strength of
of attack. 10 and 12 options, but it cannot have more than
Hacking E rrata
Consequently, hackers should not run too many 10 CPUs giving it a Strength of 60, with the new
programs against the one data lake more than CPUs but costing a large amount of money.
10 individual programs is enough to trigger a
Multiple Computers
response causing those programs to automatically
A hacker can use multiple computers at the same
cease functioning. Hackers known for using this
time if they have the Two-Fisted Perk, these can
exploit have no forms of corporate or united
be considered be running in the same action. The
nations protection and will be imprisoned for life
hacker cannot combine the CPU strength to run
in a Pentabomb work facility.
bigger programs.
CPU Speed
Multiple Computers without Two fisted
Speed of a CPU is important for each point of
A hacker can also run multiple programs on
speed the CPU can launch 1 Strength of program
different CPUs on different computers but
per action, so if a CPU with 6 strength and 1 speed
cannot combine the CPU strength to run bigger
is controlled by a hacker it can launch a program
programs.
with 6 strength in 6 actions. Speed is never
combined with more CPUs for the purpose of Multiple Ability Programs
launching programs, but each CPU can launch its
Certain programs will need to combine abilities for
own programs. For example, Line Backer takes 9
example tackle and detect, the combined Strengths
Strength a CPU with 20 Strength and 6 Speed will
makes the overall program more costly and
take 2 actions to launch Line Backer. A computer
stronger. Both abilities are active at the same time
with 2 5 Strength CPUs Speed 2 would be able
and will be combined for movement wherever
to launch 2 2 Strength programs at once or one 5
that program goes. Two or more abilities can be
Strength program over 3 actions.
combined to produce various effects and they both
Combining CPUs run at the same time but will take 1 action from
the operator to launch and direct/instruct the
If the CPUs are on the same physical computer,
program. Changing targets or directions will take
they can be combined adding their strength
1 action.
together, but not increasing the speed.
Hacking E rrata
He cannot read her thoughts, but he can hurt her
now, she has an EGO stat of 20. He launches kill
against her just as she copies the data, he deals 25
damage to her EGO she is knocked unconscious,
because her EGO is below zero and she took
5 extra general hit point damage. Her friend
mitch is watching, and unplugs her, the hacker
is disconnected the data was copied and Judy is
knocked out.
17
THANK YOU FOR PLAYING!
Epiphany Entertainment could not have got to where we are with over 15 books out and another 2 in
development without the love and support of our players.
Hacking E rrata
We really want to make sure you can use Dark Stars to do whatever you want in whatever world you
want. We have been supporting Dark Stars while we have created a new setting that deals with more
fantastic elements. All these games include new perks, skills, equipment, and your group can mix and
match these however you wish.
Here are some of our other games for you to take a look at, all the games are on Drivethru RPG, many
are also on our website. Visit Drivethru RPG
https://www.drivethrurpg.com/browse/pub/13069/Darkstars-Universe
We would love to hear what you think about our games, so message us on Facebook or send us an Email
on gnet@darkstarsuniverse.com.
18
Hacking E rrata
19
Hacking E rrata
20