• 0 Posts
  • 9 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle
  • Hmm, I don’t mind your idea at all but it is hard to implement so I see your trouble. Some folks have given good options but I’ll offer a different way to do it. I’d have one attack per player since it is a god, let him wreck house. Maybe increase the number of enemies to accommodate the attacks. Since this is a god regaining their power and their trying to control it I’d have two DCs for their check each round. First DC is if they listen and should be passed most of the time maybe 10 or 15. If they don’t then it might be bad for the party but otherwise they attack the target as intended. The second DC should be failed most of the time, maybe 20 or 25. If they fail this DC the the god still acts as ordered but releases a chaos burst as it does. I personally always use the d10000 list of chaos burst, its fun.





  • You’re pretty well on the right track. It might help if I explain what the attack is doing more. So an attacker starting out knows nothing about you or even where you are. So they need to figure these things out. The most optimal way to do this is by scanning everything and I do mean everything. There are automated scans that get information on literally everything that is open on the web. An unconfigured device that’s capable of ssh can get hit with login attempts after just 30 seconds of being plugged in. So first they try to find someone and let’s say by random they get you, they don’t know who you are yet but they have an IP now. First they run scans to see what’s available, what services are internet capable and talking to anyone who asks. Once they know what services they will do banner grabbing to try to find out specifics about the service like version number. Once they have this information they can dig for more or look for vulnerabilities specific to that service and version. Metasploit will actually tell you which attacks work for the version numbers you’ve discovered, pretty handy. If they decide to proceed they send the correct exploit to you computer and bam they’re in to do whatever. If you’re running something out of date there are usually vulnerabilities that just will allow access to attackers, this is why updating is important.

    Security through obscurity first relies on not being seen in the first place whether through not connecting to much or being something no one cares about hacking in the first place. Second it relies on being uncommon enough to not have a bunch of known vulnerabilities. A random GitHub program with 10k downloads is going to have a lot less known vulnerabilities than Microsoft office. Third it relies on being so little known that even if someone can figure out how to hack in they won’t know what to do. Imagine trying to find important documents on someone’s heavily customized Linux box as opposed to a Windows box.

    Tldr: security through obscurity is first hoping you don’t get seen then hoping if you are seen that they don’t care. It’s not good security but it might work.


  • You can try reading through the 5e players handbook or googling whatever you aren’t understanding followed by 5e. For example “spellcasting 5e” will explain spell slots, ritual spells, learning new spells, and preparing spells in the easiest way they can. 5e means 5th edition and is the version of DND the game is based on.

    Some other quick tips, most classes know a lot of spells but can’t prepare them all, you can change your prepared spells at any time outside combat. A ritual spell can be cast for free without using a spell slot outside of combat.



  • Side quests in Diablo and bg3 are vaaaaastly different. They’re much more like Skyrim but that still hardly does it justice. In Diablo you find a burning building then the survivor says you need to find her sister in a different unrelated dungeon and you get a nice quest marker directing you there. In bg3 you find a burning building and if you make a skill check you might save the last survivor, then you can extort them for money or just kill them if you really want, then they mention their sister is trapped, you can ignore it or promise help or promise more of a reward, then you get a journal entry describing where you’re currently at in that quest and it’s up to you how you handle it from there.


  • Alright so I’m not great with established lore but I am great at improvisation. What I’m gathering is that you need a reason why this unconnected leader is suddenly helping this splinter of his own organization?

    My immediate thought is politics, the actual head of this splinter has a problem (the party) and needs a way to solve it but since they’re a splinter they don’t have the resources. So through some political maneuvering they got szass to agree to help. Maybe he doesnt know they’re splintering and the party can use that to sow chaos and escape. Maybe he does know and the splinter leader used a really big bargaining chip to get szass’ help, then the party could do something for szass’ to get him to stop helping the leader.

    There’s always the illusion idea, that wasn’t really szass but a way to scare the party and throw them off. At their level this may be difficult because they probably had ways to detect this.

    There’s the intervention idea, someone investigating szass for unrelated reasons finds out where he is and launches a raid, giving the party a chance to escape. Then you get more time to figure out they why on everything.