#netdungeon
Explore tagged Tumblr posts
Text
Here's the complete CyberCore: Roleplaying System section on Nodes, essential to mastering the Netrunning architecture and hacking encounters.
Title:
🧩 CyberCore: Nodes — The Building Blocks of the Net
Txt2Image: cyberpunk architecture, neon data node, digital fortress, glowing circuit vault, network tunnel, encrypted server, floating data cubes, cyberspace control room, firewalls
[Role Playing System Messages]
In the Net, Nodes are digital locations within a system’s architecture. Each Node serves a specific function — guarding secrets, controlling hardware, or hosting deadly Black ICE.
Netrunners navigate Nodes one level at a time, often using Interface rolls, software, and cyberware to bypass defenses and manipulate data.
🧠 Node Types
Node Type Description Access Point Entry into the system. May be physical or remote. Data Storage Holds files, blackmail, or program blueprints. Control Node Interfaces with real-world devices: cameras, turrets, doors, alarms. Data Wall Firewalls between levels. Must be breached (DV 10–20+) Trap Node ICE-infested or collapsible trap zones. Often disguised. Backdoor Node Hidden alternative path. Requires Clairvoyance or roll to detect. Demon Node Spawns or controls active Demon AI. Can be corrupted or overwritten. System Core Final node. Holds root access, master files, or mission objective.
📐 Node Mechanics
You can only move one Node per turn unless using Speed Boosts or Control Software
Each Node may contain Programs, ICE, or Data Packages
Interaction is based on Interface Skill
Nodes are stacked vertically or arranged sequentially in custom maps
🎮 Example Netrun Path
[Access Point] ↓ [Data Wall] — DV 15 ↓ [Control Node] — Turret controls ↓ [Data Storage] — Corporate secrets (3 files) ↓ [Black ICE: Hellhound] ↓ [System Core] — Encrypted root access (DV 20)
Use Worm or Hammer to break through Data Walls. Deploy Shield before ICE. Load Hijack in the Control Node to take over defenses.
⚠️ Node Hazards
ICE Spikes: Instantly triggers ICE on access
Loop Traps: Forces you to repeat a level unless puzzle is solved
Data Bombs: Fake files that deal damage when accessed
Trace Beacons: Alert corp security in meatspace
🛠️ Node Interaction Programs
Hijack: Seize real-world control
Cloak: Enter node without alerting
Scrub: Erase your presence from logs
Looking Glass: Scan the node for hidden items or ICE
Spoof: Trick node into thinking you’re authorized
Cascade: Wipe node contents
🎮 Node-Based Choices:
1️⃣ Bypass the Data Wall — Roll Interface or use Worm 2️⃣ Hijack the Control Node — Shut off cameras, open vaults 3️⃣ Loot the Storage Node — Extract files, blueprints, blackmail 4️⃣ Scrub the Logs — Cover your digital tracks 5️⃣ Access the Demon Node — Subvert or destroy system AI 6️⃣ Face the ICE — Clear the node through force 7️⃣ Trace the Core — Head straight for the system root 8️⃣ Jack Out Here — Partial success, but still breathing
#cybercore#netrunning#nodes#digitalarchitecture#cyberpunk2020#blackice#demonai#datasecurity#interactivehacking#netdungeon
0 notes