Skip to main content

Questions tagged [hacking]

For questions about game rules for "hacking" that model attacking and exploiting vulnerabilities in software or hardware. (If the question is instead about "hacking" an existing game system by modifying the mechanics to make it work differently, use [house-rules] or [homebrew].)

4 votes
3 answers
244 views

In cyberpunk or modern settings, we have hacking as replacement to magic system. As a beginner to DND, usually you just look at a list of spells, pick 3-4 of them for use later in combat (mainly) or ...
Vylix's user avatar
  • 35.2k
5 votes
1 answer
625 views

We're many sessions into a homebrew cyberpunk 5E, and I've recently introduced hacking using this Modern Magic UA. I can't see in there any stipulation on how frequently a hacker class can cast a ...
mrc85's user avatar
  • 185
5 votes
1 answer
289 views

The description of the Divine Blessing of Triune says: Triune: You can use a computer without having a user interface or hacking kit simply by touching it. You must still succeed at a Computers ...
Jhyarelle Silver's user avatar
4 votes
1 answer
1k views

In Shadowrun 5, it's possible for a decker to hack a gun, but I don't quite get how that works. Do you need a mark on the gun? The example on page 228 suggests you don't. But can you get a mark on ...
mcv's user avatar
  • 2,707
17 votes
5 answers
2k views

Occasionally, I like to do CTFs. For the uninitiated, a CTF is a computer security challenge in which a bunch of computer systems are left deliberately vulnerable, and participants exploit those ...
ymbirtt's user avatar
  • 2,335
12 votes
1 answer
488 views

I'm GMing Eclipse Phase. I can describe most scenes and put my player in the mood, but when it come to hacking I'm at a loss for words. I try to concentrate on the impact of the outcome, but my ...
Sir_Glancelot_du_Lag's user avatar
12 votes
3 answers
1k views

I'm designing a Leverage one-shot using Robin Hood's Merry Men, and I've got pretty much everything figured out but the Hacker. I'm trying to define exactly what a Hacker can do in a medieval setting, ...
Tack's user avatar
  • 6,616
3 votes
3 answers
541 views

Does attaching a slave to a target give a bonus to hacking? If so, and the target is also a slave, does it allow to use the defense values of the target and not the masters' values? During our ...
JFBM's user avatar
  • 377

15 30 50 per page