Hack

Requirements You have a hacking toolkit.

You try to access, control, or change an active secured system. In most cases, this attempt is made against a local computer system that you access directly or indirectly through use of a hacking toolkit. Attempt a Computers check to determine if you can access the targeted system. Computers with improved systems might require multiple successes to access.
Critical SuccessYou access the system, or you achieve two successes toward accessing a system requiring more than one success. You leave no trace of your tampering.
SuccessYou access the system, or you achieve one success toward accessing a system that requires more than one success.
FailureYou fail to access the system or achieve any success toward accessing a system that requires more than one success. Some computerized systems might have security measures that activate on a failure.
Critical FailureYou activate specially ingrained security protocols or completely lock yourself out of the system. Being locked out of a system prevents you from attempting another check to access it for the next hour.