Does Detect Magic allow players to find magical traps without a perception check?

Consider the following scenario: The party enters a room that appears to be a dead end, but in fact has a secret door with a magical trap on it. While standing in the room, a member of the party casts Detect Magic to see if there’s anything magical in the room.

Does the glow of the trap’s magical aura allow them to automatically locate it, without the need for a perception check? If not, does it grant a bonus of any kind on the perception check?

Is it possible to detect an ssh tunnel used to bypass full vpn tunneling?

Assuming that regular workflow involves:

  1. Client connects to our VPN (full tunnel)
  2. Client uses ssh to connect to a machine
  3. Via this ssh connection, client interacts with system.

If the user were to bypass the full VPN tunnelling by using an intermediate machine and then using that intermediate machine as an ssh jump host, are there any characteristics that could be identified within the local network?

As a sysadmin, can I detect this?

To expand further, how does this extend with ssh tunneling? Ie let’s say there is a service that is exposed out of the VPN using ssh tunneling?

How to detect use of personal NAS devices from corporate machines?

We have an issue where people are taking laptops home and connecting them to their personal home networks in order to backup corporate data to their private NAS devices. From a DLP standpoint we have trouble reconciling this activity because the activity destination is typically a private IP, something like, which is also being used within the corporate network for various labs and testing environments. Short of major policy changes about IP ranges in use and things like that, are there any creative ways to determine the difference between a personal NAS device on a home network vs a corporate-issued one being used from within the corporate network?

We tried frequency analysis of similar activities, but again many generic private IP’s are being reused across both corporate and personal environments. I thought about tracking against the ‘name’ of the network to which the user is connected, but haven’t had a ton of luck with that information being readily available in the logs I have. I’ve been tasked with trying to explore this from an incident response/SOC standpoint, so my available logs are more so correlated with IDS/IPS, mcafee, CIRT, and DLP-type solutions, rather than something like OS event logs.

Looking for memory-efficient way to detect hash collisions

Given a hash function H, it’s possible that H(a) = H(b) = c

Let’s assume we have a big data set [N1 … Nk], with K items and we hash each item in this set

After operation is done, we’d get a set of hashes [H1 … Hm] where m < k, meaning we had collisions

What would be the most memory-efficient way(without storing all of hashes and hashed items) to determine if we’ve ever hashed item X before and if we did, did it collide with anything?

Is it even possible to relax memory constrains on such kind of task?

5e: Does Blindsight detect a scrying sensor?

My party’s going to be encountering an Elder Oblex that’s gained more sentience than usual. The party has a mirror of Scrying (cast once per day without components/slots). They’re wanting to use said mirror to spy on the Oblex, get an idea where exactly it is, plan an ambush for it.

Elder Oblex has blindsight. Assuming the Oblex fails the save to resist the Scrying spell, would it notice the sensor created by the spell? The sensor is invisible, which would be ignored by the blindsight, but I’m not sure if the sensor does any other kind of sensory effect that could be detectable by blindsight.

The exact wording of Scrying is, “On a failed save, the spell creates an invisible sensor within 10 feet of the target. You can see and hear through the sensor as if you were there. The sensor moves with the target, remaining within 10 feet of it for the duration. A creature that can see invisible objects sees the sensor as a luminous orb about the size of your fist.”

Thanks in advance for any advice/insight!

How does AI Robot detect a target behind a wall, but the target has part exposed?

Like a FPS game, a target’s whole body is behind a wall or box, but its finger or foot exposed, and the AI can detect it and shoot its finger?

In my opinon, just traverse all targets, find who is near a wall, and compare its position with the corner of wall, but I don’t know how to check if its finger is exposed?

Or use raycast from AI’s gun to front, but you need add collider to all targets’ every small part?

Using an active or passive scan, can I detect all devices connected to or transmitting via a Wifi network?

I know that it’s possible to do a passive scan on all channels to see if an access point sends a beacon. However, is it also possible to listen to general Wifi traffic on that channel and assemble a list of all active devices – both “clients” (like smartphone or laptop) and access points?

Is there a way to detect Modified Memories?

In D&D 5E, is there a way to detect if someone has had their memories tampered with via the spell Modify Memory?

In 3.5E, you could pick up on this with Detect Magic. According to the 3.5 SRD, Modify Memory has…

Duration: Permanent

Because it is a Permanent spell,

The energy remains as long as the effect does. This means the spell is vulnerable to dispel magic.

The above also means that Detect Magic would pick up on the aura of Enchantment Magic that is surrounding the victim of such a spell. So, if you tampered with someone’s memories, they would light up on Detect Magic as being Enchanted. Then you roll a Spellcraft check, identify the spell, and tear it down.

However, in 5E, Modify Memory has…

Duration: Concentration, up to 1 minute

and the text specifies

the modified memories take hold when the spell ends

Meaning the spell is over, and so the target is no longer under the influence of magic. Thus, they shouldn’t show up as enchanted under Detect Magic.

Given that Detect Magic doesn’t work, and that…

A remove curse or greater restoration spell cast on the target restores the creature’s true memory

Is there any actual way to tell that you need to cast one of those spells on someone, apart from accidentally stumbling upon the 10 minute span(s) that have been altered and, knowing what actually happened, you realize that their memories don’t match up with reality?

So, in short…apart from knowing the victim of the spell, and the events that were tampered with so well that you can personally verify that a memory is incorrect…is there any way to actually detect a victim of Modify Memory?