The art of hacking is easily understood but hard to master. It's the ability to breach the most secure networks, extract information from the most protected servers, and take control of the most advanced machines. With hacking, you can become a master of information, an infiltrator of secrets, and a controller of technology. You can manipulate the virtual world to your will and bend machines to your command. But be warned, the lines between right and wrong are blurred, and those who walk this path risk much. Hacking skills are for those who dare to step into the shadows and master the digital realm.
All fall under the domain of Hacking, so get your binary-colored Hat on and get cracking.
This skill also covers accessing personal PDA’s and electronic devices, secured CRED chips, and other personal portable electronics.
Note: While you use this skill to hack systems, when you use your PDA to gain remote wireless network access rather than jacking in directly, perhaps while hidden in a nearby air duct, you make an Electronics - Systems & Security roll, assuming you get into the network; all your hacking rolls are Bonus or Penaltied by the result of your Wifi Electronics - Systems & Security roll.
If you wish to improve your connection, you will need to reconnect or get direct access, risking detection.
#TODO See Electronics-systems access points for details.
Rather than spending skill points to move up skill levels, You may instead spend skill points to purchase any of the following tricks.
Cost: 2 Skill points
Requires: Tactical Training
Effect: Once per mission when you fail an Electronics Hacking check you can instead choose to succeed.
Cost: 2 Skill points
Requires: Tactical Training
Effect: You have a list of common passwords, Once per mission you get a hit on a PDA you are trying to hack and you gain full access.
Edit
Here are 10 skill tricks for Hacking in Cybercore:
Spoof Identity: You can create fake credentials to bypass security protocols and gain access to secure areas or networks. Malware: You can create a program that can infiltrate and damage computer systems, or gather and transmit sensitive data back to you. Subtle Access: You can gain remote access to a network or system without raising any alarms or detection. Social Engineering: You can manipulate and deceive people into giving up passwords, security codes, or other valuable information. Stealthy Access: You can infiltrate a secure area undetected, either physically or via the network. Bypass Security: You can bypass firewalls and other security measures to gain access to a network or system. Data Mining: You can use software tools to sift through vast amounts of data to find valuable information or patterns. Decrypt: You can decrypt and interpret encrypted data to reveal hidden information or gain access to secure systems. Secure Communications: You can set up secure channels of communication to prevent interception or eavesdropping. Network Analysis: You can analyze the structure and vulnerabilities of a network, identifying weak points and potential entry points.