Arken Lussk
Thrills, Chills, and Kills
Hubris Remote Entry and Exploitation Device
OUT OF CHARACTER INFORMATION
- Intent: To provide the closed market with a remote slicing device.
- Image Source: N/A
- Canon Link: N/A
- Primary Source:
PRODUCTION INFORMATION
- Manufacturer: Aegis Systems
- Model: Hubris REED
- Affiliation: Aegis Systems, Closed Market
- Modularity: Deployment is modular; starships, droids, vehicles.
- Production: Mass Produced
- Material: Coding, circuitry.
- Entry
- Exploitation
- Command and Control
- [+] Entry: The decryption algorithms running within this little device are quite advanced, making them perfect for cracking through hardened signals and gaining access to networks.
- [+] Exploitation: Once the Hubris has made entry, providing its source remains close to the target, the operator is able to traipse through networks with ease after gaining privileged permissions. They can deploy various sorts of malicious logic (viruses, trojans) as well as mine for data.
- [+] Command and Control: Seeing as the Hubris requires an uplink, it's possible for a single operator to oversee the use of multiple REEDs in use, making Denial of Service attacks and adapting to defenses far easier.
- [-] Warring: Following the archaic tactics of wardriving or biking; droids, vessels, or other devices must remain close to their targets to achieve any sort of results.
- [-] Useless Uplink: Without a controlling computer, node, or connection, the Hubris REED is essentially a small piece of deadened circuitry.
- [-] Power Hungry: Given the fact that it acts as a parasite and sucks up the host's power, the Hubris is notorious for draining power rapidly to fuel its cryptographic processors.
The first of its kind, the Hubris Remote Entry and Exploitation Device is a premier remote slicing tool created by Aegis Systems. Intentioned mainly for civilian environments for penetration testing and hardening networks, Aegis Systems has also reached out into the militant market to advertise their newest asset.
Physically, the Hubris is a tiny computerized chip. Its physical profile and purposes make it perfect for augmenting droids, starships, and can even be integrated into personal computer systems.
The Hubris REED is essentially a gateway. It's a small device possessing enormous processing capacity (depending on the host) for decryption, entry, and exploitation services. It boasts advanced decryption algorithms, rainbow tables, and their ilk for gaining entry into remote systems. Once access has been granted, the typical operator of Hubris feeds viruses into the system to wreck havoc, gain administrator privileges and then it's up to the operator's creativity.
However, there are several drawbacks to this awesome weapon on the fifth domain. First of all, its origins hail from that of war-driving, an old tactic used to test networks through remote attacks, so the Hubris REED's host must remain close to their target to produce results. This connection road is a two-way one as well, as their command uplink must remain very close as well. Be it a slicer with a computer or a command ship. Those being attacked by the Hubris will always know if the Hubris is close, their operator is as well. And lastly, the Hubris is a power hog and can hamper normal functionality of their hosts units.
Summarily, the Hubris REED is a tool for remote attacks over the fifth domain of warfare. It's capable, versatile, and well suited for anyone interested in strengthening their own networks or tearing others asunder.
- Fixed broken logo image link.
- Fixed broken links: affiliation.
- Fixed broken formatting.
Last edited: