Hacking Nodes Generator - Cities Without Number

Computer Systems are their own dungeon just for the Hacker. These tables create a random system.

This chart uses input variables
  • Security_Level
Result

{% NodeOne = roll_chart cols:1 name:"Node Types" %}
{% NodeTwo = roll_chart cols:1 name:"Node Types" %}
{% NodeThree = roll_chart cols:1 name:"Node Types" %}
{% NodeFour = roll_chart cols:1 name:"Node Types" %}
{% NodeFive = roll_chart cols:1 name:"Node Types" %}
{% NodeSix = roll_chart cols:1 name:"Node Types" %}
{% NodeSeven = roll_chart cols:1 name:"Node Types" %}
{% NodeEight = roll_chart cols:1 name:"Node Types" %}
{% NodeNine = roll_chart cols:1 name:"Node Types" %}
{% NodeTen = roll_chart cols:1 name:"Node Types" %}

Hacking Nodes Generator

{$Security_Level}

Security Difficulty: Roll on "Common Security Levels" (cols="2", filter="{$Security_Level}")

Suggested Number of:

Nodes: Roll on "Common Security Levels" (cols="5", filter="{$Security_Level}")
Demons: Roll on "Common Security Levels" (cols="3", filter="{$Security_Level}")
Max Active Demons: Roll on "Common Security Levels" (cols="7", filter="{$Security_Level}")
Barriers: Roll on "Common Security Levels" (cols="6", filter="{$Security_Level}")

Modifier: Roll on "Modifier"


Node One

Node: {$NodeOne}

Description: Roll on "Node Types" (cols="2", filter="{$NodeOne}")

Subject: Roll on "Node Types" (cols="3", filter="{$NodeOne}") Type: Roll on "Node Types" (cols="4", filter="{$NodeOne}") Modifier: Roll on "Node Types" (cols="5", filter="{$NodeOne}")

Node Two

Node: {$NodeTwo}

Description: Roll on "Node Types" (cols="2", filter="{$NodeOne}")

Subject: Roll on "Node Types" (cols="3", filter="{$NodeOne}") Type: Roll on "Node Types" (cols="4", filter="{$NodeOne}") Modifier: Roll on "Node Types" (cols="5", filter="{$NodeOne}")

Node Three

Node: {$NodeThree}

Description: Roll on "Node Types" (cols="2", filter="{$NodeOne}")

Subject: Roll on "Node Types" (cols="3", filter="{$NodeOne}") Type: Roll on "Node Types" (cols="4", filter="{$NodeOne}") Modifier: Roll on "Node Types" (cols="5", filter="{$NodeOne}")

Node Four

Node: {$NodeFour}

Description: Roll on "Node Types" (cols="2", filter="{$NodeOne}")

Subject: Roll on "Node Types" (cols="3", filter="{$NodeOne}") Type: Roll on "Node Types" (cols="4", filter="{$NodeOne}") Modifier: Roll on "Node Types" (cols="5", filter="{$NodeOne}")

Node Five

Node: {$NodeFive}

Description: Roll on "Node Types" (cols="2", filter="{$NodeOne}")

Subject: Roll on "Node Types" (cols="3", filter="{$NodeOne}") Type: Roll on "Node Types" (cols="4", filter="{$NodeOne}") Modifier: Roll on "Node Types" (cols="5", filter="{$NodeOne}")

Node Six

Node: {$NodeSix}

Description: Roll on "Node Types" (cols="2", filter="{$NodeOne}")

Subject: Roll on "Node Types" (cols="3", filter="{$NodeOne}") Type: Roll on "Node Types" (cols="4", filter="{$NodeOne}") Modifier: Roll on "Node Types" (cols="5", filter="{$NodeOne}")

Node Seven

Node: {$NodeSeven}

Description: Roll on "Node Types" (cols="2", filter="{$NodeOne}")

Subject: Roll on "Node Types" (cols="3", filter="{$NodeOne}") Type: Roll on "Node Types" (cols="4", filter="{$NodeOne}") Modifier: Roll on "Node Types" (cols="5", filter="{$NodeOne}")

Node Eight

Node: {$NodeEight}

Description: Roll on "Node Types" (cols="2", filter="{$NodeOne}")

Subject: Roll on "Node Types" (cols="3", filter="{$NodeOne}") Type: Roll on "Node Types" (cols="4", filter="{$NodeOne}") Modifier: Roll on "Node Types" (cols="5", filter="{$NodeOne}")

Node Nine

Node: {$NodeNine}

Description: Roll on "Node Types" (cols="2", filter="{$NodeOne}")

Subject: Roll on "Node Types" (cols="3", filter="{$NodeOne}") Type: Roll on "Node Types" (cols="4", filter="{$NodeOne}") Modifier: Roll on "Node Types" (cols="5", filter="{$NodeOne}")

Node Ten

Node: {$NodeTen}

Description: Roll on "Node Types" (cols="2", filter="{$NodeOne}")

Subject: Roll on "Node Types" (cols="3", filter="{$NodeOne}") Type: Roll on "Node Types" (cols="4", filter="{$NodeOne}") Modifier: Roll on "Node Types" (cols="5", filter="{$NodeOne}")


Subcharts

Node Types (d25)

d25 What you find desc Subject Type Modifier

1

Firewall

Digital barriers that protect systems from unauthorized access. Hackers must find weaknesses or bypass firewalls to gain entry.

Barrier

Data

0

2

Black ICE

Dangerous and lethal security programs that can harm the hacker's virtual persona. (Failed skill check applies Stun verb to Hacker. High-Security locations will use the Kill verb)

Barrier

Data

1

3

Security Alert

Any unscheduled activity in the Node is noticed. Hackers has two rounds to stop Alert the Network action from Node.

Program

Program

0

4

Trace Programs

Any unscheduled activity in the Node is noticed. Hackers has two rounds to stop Program from pinpointing where the Hacker first entered the system.

Program

Program

0

5

Operations Datafiles

Node contains data and monitoring of staff in building. This can be anything from HR Records, Personnel Files, and Live Location monitoring.

Datafile

Data

0

6

Contain and Isolate

The Node is a trap. The Hacker has two rounds to stop the Node from severing its connections to other nodes. If not stopped after two rounds, the Hacker is unable to advance or return to past nodes. The Hacker will need to jack out and breach again if they want to keeping hacking the system

Program

Program

-1

7

Demon Node

Node always has one Demon in addition to any other Avatars rolled for this Node

Avatar

Avatar

0

8

Data Corruption

Corrupted Datafile are stored here. Hacker can attempt to steal the datafiles, but won't know what the data contains until after they have jacked out and had time to repair the data.

Datafile

Data

0

9

Decoy Data

Datafiles on Node contain false or misleading information designed to divert the Hacker's attention.

Datafile

Data

0

10

Biometric Locks

Datafiles on Node contain high-value information, but can only be aced by biometric data (e.g., fingerprints, retinal scans) at Device near server. Hacker learns location of this Device and Service

Datafile

Data

0

11

Physical Access Requirements

Datafiles on Node contain high-value information, but can only be aced by physical access to specific Devices. Hacker learns location of this Device.

Datafile

Data

0

12

Malware

Infected systems or files that can harm the Hacker's digital tools or Avatar. If Hacker fail skill check, the have a -1 or -2 modifier unplanned to them for the rest of the run. Hacker will need to jack out and access again to removed negative effect.

Program

Program

-1

13

Legacy Network

Slow network connections that make it difficult to operate efficiently. All Avatar and Demons have -2 to skill checks. Raise The Alarms actions takes 4 turns instead of 2. Hacker can use Unluck, Sense, or Glitch, or Analyze verb to remove their negative modifier. Enemies cannot remove their modifiers.

Server

Device

-2

14

Lack of Information

Limited or incomplete information about Node. Whatever used to be here has left no discernable trace of what it once was.

Barrier

Data

0

15

Lack of Information

Limited or incomplete information about Node. Whatever used to be here has left no discernable trace of what it once was.

Barrier

Data

0

16

Lack of Information

Limited or incomplete information about Node. Whatever used to be here has left no discernable trace of what it once was.

Barrier

Data

0

17

Lack of Information

Limited or incomplete information about Node. Whatever used to be here has left no discernable trace of what it once was.

Barrier

Data

0

18

Lack of Information

Limited or incomplete information about Node. Whatever used to be here has left no discernable trace of what it once was.

Barrier

Data

0

19

Lack of Information

Limited or incomplete information about Node. Whatever used to be here has left no discernable trace of what it once was.

Barrier

Data

0

20

Lack of Information

Limited or incomplete information about Node. Whatever used to be here has left no discernable trace of what it once was.

Barrier

Data

0

21

Data, High-Security -

Node contains valuable data files

Datafile

Data

-3

22

Data, Med-Security

Node contains valuable data files

Datafile

Data

-2

23

Data, Low-Security

Node contains valuable data files

Datafile

Data

-1

24

Data, Unprotected

Node contains valuable data files

Datafile

Data

0

25

Lack of Information

Limited or incomplete information about Node. Whatever used to be here has left no discernable trace of what it once was.

Barrier

Data

0

Common Security Levels (d7)

d7 Common Security Levels Difficulty Demon Avatar Nodes Barriers Max Active Demons

1

Private home network

7

0

0

0 - 5

0

0

2

Small business or minor gang

8

2

0

5 - 10

1

1

3

Minor government office

8

3

0

10 - 15

2

2

4

Corp branch office or major gang

9

5

0

15 - 20

4

2

5

Important government facility

9

5

1

20 - 25

4

2

6

Corp high-security network

10

8

2

25 - 30

6

2

7

Corp or government black site

12

12

3

30

10

3

Modifier (1d7)

1d7 Result

1

Hacker has inside security info: -1

2

Their tech or skill is unusually good: +1

3

Their tech or skill is poor or makeshift: -1

4

Hacker has inside security info: -2

5

Hacker has inside security info:  -3

6

Their tech or skill is unusually good: +2

7

Their tech or skill is poor or makeshift: -2