Hackers Wikia
Advertisement


  Български - Атакуващи  简体中文 - 进攻病毒  正體中文 - 暴力程式  Čeština - Útočné  English - Offensive  Français - Offensif  Deutsch - Offensiv  Bahasa Indonesia - Program Penyerangan  Italiano - Offensivi  日本語 - 攻撃  Bahasa Malayu - Penyerang  Polski - Ofensywne  Português - Ofensivo  Română - Ofensiv  Русский - Атакующие  Español - Ofensivo(Español)  Türk - Saldırı  Tiếng Việt - Chương trình tấn công tổng lực


This page is currently in English. Please translate into Czech.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.


Battering ram Ion cannon Blaster Kraken
Battering Ram Beam Cannon Blaster Kraken
Maniac Shuriken Shock Worms
Maniac Shuriken Shocker Worms

Summary[]

Offensive programs are the standard method of hacking a network. Using attacks such as Beam Cannon, Worms and even a mighty Kraken, a player can overwhelm any Security Nodes placed on a network by force. This method of attacking is referred to as using "Brute Force" and differs significantly from the more subtle Stealth attacks.

Attack Priorities[]

Different programs have different methods of attack, with some programs also having additional special abilities. When an offensive program has a choice of which node to attack, most programs select a target using the following criteria.

Priority list:

WARNING: This list is based on current observations. While not guaranteed to be 100% accurate, it has proven to be correct most of the time. (See current discussion in comments.) The in-game priorities differ from what is intended, and will be amended in a future update. [1].

  1. Active Security Nodes - (Sentry, Turret, Black ICE). Other Security Nodes (Guardian, Scanner and Code Gate) are considered regular nodes in this regard.
  2. The Core.
  3. Black Nodes - Nodes with an installed antivirus.
  4. Partially Black Nodes - Nodes where an antivirus is currently being loaded.
  5. White Nodes - Nodes where an antivirus is not present.
  6. Nodes under the Wraith effect.

If connected nodes fall under the same category, the order in which nodes are connected takes precedence, with nodes that are connected first having priority over nodes which are connected last. [2]
- Credit to Wakaka, Love.Wolf and Invictus - thanks!

Programs that fire projectiles such as Blasters and Worms can change targets during an attack if a connected node with a higher priority is reclaimed by the defender. Channeled attacks such as the Beam Cannon will select a target and remain targeting that node until either itself or its target is compromised, regardless of changes to its surroundings.

References[]

Hackers Wikia - Seznam Programy
Úvod
Programy Uzly Hraní hry
Útočné

Battering ram Beranidlo  Ion cannon Laserový paprsek  Blaster Fúzní dělo  Kraken Kraken 
Maniac Maniak  Shock Zkrat  Shuriken Hvězdice  Worms Červi 

Obranné

Icewall LEDová Zeď  Protector Protektor 

Tiché

Access Přístup  Dataleach Datová pijavice  Portal Portál  Wraith Přízrak 

A.I. Programs

Beetle UI Brouk  Hawk UI Jestřáb  Squid UI Oliheň 

Advertisement