Archives of Nethys

Pathfinder RPG (1st Edition) Starfinder RPG Pathfinder RPG (2nd Edition)

All Rules | Downtime Rules


Equipment

Dynamic Hacking

Source Tech Revolution pg. 70
In a technological multiverse, digital infiltration can outclass other methods, such as brute force, easily. This article builds on the existing Starfinder rules for hacking, creating a compatible, engaging subsystem that can include an entire party. Use traditional Computers checks for simple, low-pressure situations and employ this subsystem for more interactive hacking encounters—all in the same campaign!
Hacking in the Core Rulebook is straightforward, requiring just a Computers check to access a secured system and avoid countermeasures, sometimes with an additional Computers check to overcome the occasional fake shell or firewall.
Dynamic hacking involves three key differences. First, a hacking encounter spans multiple phases, during which the hacker can pursue various objectives. Second, a hacker splits their Computers skill into several specializations (Deceive, Hack, and Process), used in place of the Computers modifier during the encounter. Finally, multiple hackers can contribute to dynamic hacking—even PCs with limited technical skills.
Dynamic hacking functions with existing rules and encounters with minimal adaptation. Rules and guidelines for using this system with existing character options appear on page 73.

Computers Subskills

Source Tech Revolution pg. 70
In dynamic hacking, the Computers skill is broken into three subskills used for various tasks: Deceive, Hack, and Process. Deceive represents your ability to hide or misrepresent your identity to avoid detection, confound foes, and trick your way past safeguards. Hack represents your prowess to manipulate programs, exploit vulnerabilities, and brute-force your way into a computer’s files. Process represents your ability to identify threats and opportunities, as well as change, sustain, defend, or repair your own programs. Your modifier for each of these subskills equals your Computers skill modifier, plus any modifiers based on how you configure your hacking persona (see below).

Digital Persona

Source Tech Revolution pg. 70
While hacking into a computer, you navigate and manipulate its systems through a persona, which is your anchor in that digital world. The persona’s simply a bundle of code through which you act, though you can give it a sensory signature that others perceive when interacting with it. However, your persona is also a target through which others can attack you, track your location, and expel you from the digital space.
Persona Health: Countermeasures might attack your persona, degrading its performance or even using the persona to attack you and your equipment more directly. Your persona’s overall health is measured by Connection Points (CP), with lost CP representing damage that impairs performance and connectivity. Your digital persona has a maximum number of CP equal to 12 + 2 × your Computers ranks. You can restore lost CP with the repair action (page 72), and you replenish all lost CP when you spend 1 Resolve Point and take 10 minutes to recover Stamina Points.
Your persona malfunctions as it loses CP. When your persona’s current CP is at or below 75% of its maximum, randomly select one of your three Computers subskills and apply a –2 penalty to your checks with that subskill. When your persona’s CP is at or below 50% of its maximum, apply that –2 penalty to your checks with the other two subskills. Increase the penalty to –3 when your persona’s CP falls to or below 25% of its maximum.
If its CP total ever drops to 0, your persona disintegrates, and you and any support hackers linked to your persona are immediately ejected from the encounter and can’t rejoin until you’ve restored your persona’s current CP to 1 or higher.
Configuring a Persona: When you begin a hacking encounter, you configure your persona, assigning a circumstance modifier between –3 and +3 to each of the three subskills: Deceive, Hack, and Process. The sum of these modifiers can’t exceed your number of Computers ranks divided by 3. If you have your own computer (Core Rulebook 213), you can harness its power to enhance your persona, in which case the three circumstance modifiers’ sum above can’t exceed your computer’s tier.
In addition, you decide whether your persona will act independently or will aid an allied hacker’s persona, establishing whether you are a lead hacker or support hacker.
Lead Hacker: This hacker can perform a major action and a minor action during each phase (action types appear on page 72). In turn, they are vulnerable to countermeasures’ effects. At least one lead hacker must be present to begin a hacking encounter, and any number of lead hackers can participate.
Support Hacker: This hacker’s persona is connected to that of an allied lead hacker. Support hackers are rarely affected directly by countermeasures and can make greater use of non-Computers skills, but they can perform only one minor action each turn. If their lead hacker leaves the encounter, any connected support hackers also leave the encounter.

Beginning And Ending The Encounter

Source Tech Revolution pg. 70
A hacking encounter begins when one or more users access a secured computer by either directly accessing the computer’s user interface (like a terminal), physically accessing a computer using a hacking kit, or attempting to break into the computer through an infosphere or similar network. Once they begin, the hackers typically work against a timer, as most countermeasures have countdowns that represent how quickly they react to intruders.
The encounter continues so long as at least one hacker accesses the computer; however, a GM might end the encounter once a hacker has secured root access or resolved all countermeasures, either of which ends the encounter’s remaining threat.

Hacking Phases

Source Tech Revolution pg. 71
Much like physical combat, dynamic hacking takes place in phases, during which hackers and automated defenses take turns acting within a digital space. The hackers always act first in a phase, after which the computer’s defenses resolve any of their effects. Each phase, hackers can perform an assortment of actions, including major actions that cause substantial effects and minor actions that focus more on observation, commands, and support. Any lead hacker can perform one major action and one minor action per turn, whereas a support hacker can perform only a minor action per turn.
Bonus Actions: At the start of their turn, a hacker can choose to perform additional actions. A lead hacker can choose to take up to three additional major actions during their turn, but they take a cumulative –5 penalty to all skill checks they attempt during their turn for each additional major action taken. A support hacker can choose to take a major action instead of a minor action by spending 1 Resolve Point.

Hacking Objectives

Source Tech Revolution pg. 71
Objectives represent a combination of goals and obstacles that a hacker overcomes during a hacking encounter. An encounter typically begins with several objectives, and additional objectives appear over the course of the encounter. These objectives are divided into three categories based on their lead function, and sample objectives appear on page 73.
Countermeasures: These objectives represent deliberate defenses that pose some risk to hackers. They range from alarms and contingent computer viruses to live counterhackers attempting to stymie intruders.
Modules: These objectives are programs that typically have value to the hackers—and are usually the reason for hacking in the first place—such as command modules that control doors or data modules that contain valuable intelligence.
Nodes: These objectives are figurative branches within the computer that provide access to other objectives beyond. Reaching modules often requires traversing one or more nodes.

Objective Statistics

Source Tech Revolution pg. 71
Objectives typically include a name, a description, and the following.
Check DC: This is the base DC of skill checks for interacting with this obstacle. An obstacle’s check DC equals either 15 + 1-1/2 × the encounter’s CR or 15 + 3 × the computer’s tier. Specific checks and actions often include modifiers that adjust this value.
Resolve: This lists the way or ways a hacker might overcome the objective. A Resolve entry lists the checks required, the number of successes required for each check, and any modifier to the base DC for those checks. For example, an obstacle with a Check DC of 18 that lists Hack (DC + 0, 2 successes) and Process (DC – 2, 1 success) as its Resolve entry requires two successful DC 18 Hack checks and one successful DC 16 Process check to overcome.
Support: This lists any alternate skills a hacker can use when performing the aid action to assist another hacker in overcoming the obstacle.
Countdown: This is a timer that triggers special conditions after a certain number of phases, listed in parentheses; some obstacles’ Countdowns are rolled randomly when the obstacle appears. At the end of each hacking phase, reduce this number by 1. If the number is ever reduced to 0, the listed effect occurs.
Success: This is any special effect that happens once the objective has been resolved.
Special: This is any additional effect the obstacle creates.

Hacking Actions

Source Tech Revolution pg. 72
The following are common actions used in dynamic hacking encounters. At the GM’s discretion, a hacker might be able to perform actions other than these.

Aid (Minor)

Source Tech Revolution pg. 72
You run programs, review diagnostics, or look for weaknesses that help your lead hacker with an upcoming task.
Check: Choose one action that a lead hacker will attempt this phase. Attempt the same check, but the DC of your check instead equals 10 or the obstacle’s base DC – 10, whichever is higher. If the obstacle lists additional skills in its Support entry, you can attempt a check with one of those skills in place of the skill typically used for the action.
Success: The lead hacker gains a +2 bonus to their check to perform that action if they do so before the end of the phase. The bonus increases to +3 if you exceed the DC by 5–9, and increases to +4 if you exceed the DC by 10 or more. A lead hacker can’t gain more than a +4 bonus to any one check from the aid action, even if aided by multiple allies.
Special: You can’t use this action to grant a bonus to one of your own actions.

Assess (Minor)

Source Tech Revolution pg. 72
You study an obstacle to understand its features.
Check: Process + 0
Success: You learn the Resolve, Support, Countdown (including the current countdown value), Success, and Special entries for the obstacle. You gain a +1 circumstance bonus to checks to resolve the obstacle for 3 phases. If you exceed the DC by 5 or more, you also identify whether the obstacle has any hidden countermeasures, such as a data bomb or fake shell.

Blend (Major)

Source Tech Revolution pg. 72
You camouflage your persona and conceal signs of your activity.
Check: Deceive + 0
Success: You increase the countdown of all objectives by 1. If you exceed the check’s DC by 5 or more, you can choose one objective and instead increase its countdown by 1d3.

Decoy (Major)

Source Tech Revolution pg. 72
You create a fake persona that confounds countermeasures.
Check: Deceive + 0
Success: You create a convincing decoy that lasts until the end of the encounter. When a countermeasure would affect your persona, it has an equal chance of affecting your persona or one of your decoys (such as a 1 in 3 chance of affecting your persona if you have two decoys). Once a countermeasure affects a decoy, that decoy is destroyed with no effect. Countermeasures that do not target a persona (such as wipe) ignore decoys.
Special: Each time you successfully create a decoy, the DC to create additional decoys increases by 4.

Modify (Major)

Source Tech Revolution pg. 72
You change a vulnerable program’s functions. This action has a wide range of applications, from deleting a program or changing a module’s data to building or installing a contingent virus. Check: The check varies by the task, determined by the GM.
Destroying or destabilizing programs typically requires a Hack check, whereas forging data or installing a backdoor typically requires a Deceive check. Simple tasks might reduce the DC by up to 5, whereas very complicated tasks might increase the DC by up to 5. Some tasks are so vast in scope that they require hours or more—beyond the scope of most hacking encounters.
Success: You successfully perform the action.

Recalibrate (Major)

Source Tech Revolution pg. 72
You adjust your persona’s subskills for new tasks.
Check: Process – 2
Success: Reassign the circumstance modifiers you applied when configuring your persona at the beginning of the encounter, setting each modifier between –3 and +3 so long as their sum does not exceed the value allowed by your computer or number of Computers ranks (page 70).

Repair (Major)

Source Tech Revolution pg. 72
You restore damage sustained by your persona or that of an ally.
Check: Process – 5
Success: You restore a number of the persona’s lost CP equal to 1d6 + half your ranks in Computers, Engineering, or Medicine (whichever is highest). If your check exceeds the DC by 5 or more, increase the CP recovered to 1d6 + your ranks in Computers, Engineering, or Medicine (whichever is highest).

Resolve (Major)

Source Tech Revolution pg. 72
You identify and exploit weaknesses in an objective’s code or behavior. This is the action used to defeat objectives, as noted in their respective Resolve entries.
Check: The checks required vary by objective.
Success: You achieve one success toward resolving the objective. If the objective requires multiple successful checks using the subskill you used, and if your check result exceeds the DC by 10 or more, this action is instead treated as two successes toward resolving the objective.

Dynamic Hacking Encounters

Source Tech Revolution pg. 73
Hacking encounters vary to reflect the hackers’ goals and the target computer’s capabilities. Each encounter includes at least one objective tied to the hacker’s goal (such as secret data to steal or a door to open), at least one countermeasure that opposes the hacker, and often, one or more nodes that create avenues the hackers must navigate toward their goals.
To build an encounter, set the encounter’s Challenge Rating— which sets the encounter’s check DC (page 71)—and decide on an approximate encounter length based on the number of checks required to resolve the key objectives. A short encounter requires about 5–7 successful checks to resolve the main objectives, whereas longer encounters might require 10–15 checks. For each lead hacker involved, add enough countermeasures to increase the number of checks by 2 (for shorter encounters) or by as much as 4 for longer encounters. For each support hacker, increase the number of checks by 1.
Scaling an encounter in this way need not always involve adding more countermeasures but could instead involve requiring an additional success to resolve specific objectives. This way, even if more PCs join the encounter as lead hackers than you anticipated, you can easily adjust the encounter to provide a fairly similar challenge.
Timed Encounters: In Starfinder, successfully accessing a system often affords the hacker time to explore at leisure. While a dynamic hack attempt might include finite countermeasures and a clear win condition, the format also supports hackers clashing with an array of defenses that multiply faster than the PCs can deactivate them. In this case, the goal becomes resolving enough countermeasures to stay safe, accomplish the mission, and escape before being overwhelmed or detected.

Sample Objectives

Source Tech Revolution pg. 73
The following are common objectives, including adaptations of existing modules and countermeasures from the Core Rulebook.

Basic Counterhacker (Countermeasure)

Source Tech Revolution pg. 73
This capable programmer shores up the computer’s defenses.
Resolve: Deceive (DC + 0, 2 successes) or Hack (DC + 2, 2 successes)
Countdown (3): Whenever the countdown reaches 0, the counterhacker causes two effects. First, they damage the persona of one lead hacker, causing it to lose CP equal to 2d6 + the encounter’s CR. That lead hacker can halve the CP their persona lost by succeeding at a DC + 0 Process check. Second, the counterhacker can perform one of the actions below. Afterward, roll 1d3 to determine the obstacle’s new countdown value.
Attack: Increase the Process check DC to resist the damage by 2, and treat all 1s on the damage dice as 2s.
Infect: The counterhacker infects the persona with a virus. Each phase after the hackers act, the infected persona loses CP equal to 1d6 plus half the encounter’s CR, and any computer that persona’s hacker is using takes damage equal to twice the CP lost. The virus can be removed by spending a major action and succeeding at a DC + 0 Hack check.
Repair: Choose one obstacle that hasn’t been resolved. Treat one of the checks to resolve that obstacle as though it had not been fulfilled this encounter.
Trace: The counterhacker assesses the persona’s signature and identifies where its associated hacker is located unless that hacker succeeds at a DC + 0 Deceive check.

Node, Basic (Node)

Source Tech Revolution pg. 73
The collection of file paths requires some effort to navigate and secure permission to restricted areas beyond.
Resolve: Hack (DC – 2, 1 success), Process (DC + 0, 1 success)
Support: Perception
Success: Add the node’s linked obstacles to the encounter.

Node, Fake Shell (Node)

Source Tech Revolution pg. 73
This node misleads hackers toward a falsified set of files.
Resolve: Hack (DC – 2, 1 success), Process (DC + 0, 1 success)
Support: Perception
Success: Add the node’s linked obstacles to the encounter.
Special: If the Process check to resolve this obstacle doesn’t exceed the DC by 5 or more, the linked obstacles are convincing fakes that function as normal obstacles, but resolving them provides no benefit (e.g. seemingly valuable data is worthless, command modules can’t direct devices, etc.).

Root Access (Module)

Source Tech Revolution pg. 73
You secure absolute administrator privileges, allowing you to modify any of the computer’s functions with ease.
Resolve: Hack (DC + 20, 1 success), Hack (DC + 15, 1 success), Deceive (DC + 10, 1 success)
Success: You and allied hackers reduce DCs to resolve obstacles by 20 and automatically succeed at checks to analyze objectives.

Secure Data (Module)

Source Tech Revolution pg. 73
This is an average-security data module with valuable contents. Large secure data modules typically require additional checks to resolve, have higher check DCs, or both.
Resolve: Hack (DC + 0, 1 success), Process (DC + 0, 1 success)
Support: Profession check related to the data
Success: Hackers can now use the modify action accompanied by specific subskill checks to delete (Hack), modify (Hack), forge (Deceive), or copy (Process) the module’s contents. As a special minor action, a hacker can study the contents with a successful DC + 0 Process check or related skill check to seek specific info or attain a basic understanding of the module’s contents.

Wipe (Countermeasure)

Source Tech Revolution pg. 73
This program destroys important data.
Resolve: Deceive (DC + 0, 1 success), Hack (DC + 0, 1 success)
Special: Count the number of times hackers fail a check to resolve an obstacle while the wipe countermeasure is active. Once the count reaches 2 failures, this countermeasure begins erasing one or more other objectives, imposing a –5 penalty to resolve them. At the end of the next hacking phase, those objectives are removed from the encounter and can no longer be resolved.

Adapting Hacking Abilities

Source Tech Revolution pg. 73
The following are guidelines for adapting existing class features and character options to the dynamic hacking system.
Faster Hacking: An ability that reduces the time it takes to hack instead reduces the penalty a lead hacker takes when performing additional major actions to –3 per additional action.
Delay Countermeasures: An ability that would delay a countermeasure’s activation instead increases that countermeasure’s starting countdown value by 1.
Negate Countermeasures: Abilities that would negate a countermeasure entirely instead grant that character a +10 bonus to their first check to resolve the countermeasure.
Security: Features that increase the check DC to hack your own computer instead apply their bonus to your checks made to resist any effect that would harm your computer or persona.