[go: up one dir, main page]

0% found this document useful (0 votes)
25 views2 pages

Netrunner Net Actions

Uploaded by

Lashrac Sigil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views2 pages

Netrunner Net Actions

Uploaded by

Lashrac Sigil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Scenario: Infiltrating a Corporate Network

Setting the Scene:

The Netrunner, equipped with their cyberdeck, has just connected to the corporate network while the rest
of the team is creating a distraction at the corporate office. The atmosphere is tense, as security measures
are active, and time is of the essence.

Netrunner's Turn:

1. Assess the Environment:

o Scanner: The Netrunner quickly scans the network map displayed on their cyberdeck,
identifying firewalls, security programs, and potential entry points.

o Mechanics: Roll a “Perception” check to determine if they notice any hidden security
measures or vulnerabilities (DC set by the GM).

2. Initiate a Hack:

o Backdoor: The Netrunner targets a firewall to gain entry.

o Pathfinder: Roll a “Hacking” check against the firewall’s defense score. If successful, they
bypass the firewall and gain access to the network.

3. Deploy a Virus:

o Virus: Once inside, the Netrunner decides to deploy the Data Phantom virus to create
distractions and gather intel.

o Mechanics: Roll a “Program” check to install the virus (DC set by the GM). If successful, the
virus begins to siphon data while altering logs.

4. Monitor Network Activity:

o Eye-Dee: The Netrunner keeps an eye on the system for incoming alerts or countermeasures
triggered by the virus.

o Mechanics: Make a “Search for Intrusions” check to anticipate and prepare for any security
responses.

5. Coordinate with the Team:

o Control: While working in the digital space, the Netrunner communicates with their team via
a secure channel, relaying updates and timing.

o Roleplay: Describe the tension as the team waits for the Netrunner’s signal to proceed with
their part of the plan.

6. Plan the Next Move:

o Cloak: Depending on the data gathered, the Netrunner decides whether to delve deeper into
the network or extract valuable information quickly.

o Mechanics: This could involve a new check to access specific files or setting up a backdoor
for future access.

Conclusion:

The Netrunner’s turn combines tactical decision-making with dice rolls to determine success or failure. The
actions taken have immediate consequences on the narrative, influencing both the virtual landscape and
the real-world scenario unfolding outside. Each choice shapes the flow of the mission, making Netrunners
integral to the team's success in a Cyberpunk Red campaign.

You might also like