Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.
Summary
The Kraken is a Brute Force Offensive Program which attacks nodes using the shortest possible path towards the network's Core. When there are multiple nodes in a network path, it will attack the node with the highest firewall.
One Kraken program can be installed on each netConnection in a network. They cannot be installed by the user on any other type of node.
Each Kraken program automatically installs one copy of itself on each node it captures. If the next node along its path already has a Kraken installed, their tentacles merge together and they combine their strength while still occupying only one program slot. The strength of a Kraken program on each installed node is equal to its program strength multiplied by the number of Kraken programs that have converged up to that point. As of v1.030, Kraken overwrites worms on a full node. Kraken will not overwrite any other offensive or defensive programs.
They will continue this pattern until they capture the Core, then they will simultaneously attack all hostile nodes connected to the Core, similar to the Shuriken. As of Patch v1.011, the damage to nodes connected to the Core is equal to the Kraken's base program strength with no multipliers. Attacks from the Core do not install the Kraken onto connected nodes.
If a hacker does not maintain control of all the nodes the Kraken is installed on, the tendril(s) will be severed and the Kraken will be forcibly uninstalled from all nodes after the break point.
In this video you can see an example of a network attacked by a Kraken program.
Statistics
- Notes: While the Kraken is technically allowed to upgrade at the Evolver levels displayed, the Capacity of B-coins that can be held at those levels may not be sufficient to purchase the upgrade.
More Info here: Max amount of B-coins at Core Level.
Level | Strength (DPS 1-5x) |
Compilation Price |
1 | 36-180 | B60 |
2 | 41-205 | B120 |
3 | 46-230 | B180 |
4 | 52-260 | B240 |
5 | 59-295 | B300 |
6 | 66-330 | B360 |
7 | 75-380 | B420 |
8 | 85-430 | B480 |
9 | 96-485 | B540 |
10 | 108-540 | B600 |
11 | 122-610 | B660 |
12 | 138-690 | B720 |
13 | 156-780 | B780 |
14 | 176-880 | B840 |
15 | 199-995 | B900 |
16 | 225-1125 | B1,020 |
17 | 254-1270 | B1,140 |
18 | 287-1435 | B1,260 |
19 | 325-1625 | B1,380 |
20 | 367-1835 | B1,500 |
21 | 415-2075 | B2,000 |
Level | Upgrade Cost |
Experience Gained |
Research Time |
Required Evolver Level |
1 | B8,000 | 475 | 12 Hours | 5 |
2 | B16,000 | 500 | 18 Hours | 5 |
3 | B32,000 | 600 | 24 Hours | 6 |
4 | B48,000 | 700 | 30 Hours | 6 |
5 | B60,000 | 800 | 36 Hours | 7 |
6 | B80,000 | 830 | 42 Hours | 7 |
7 | B100,000 | 860 | 48 Hours | 8 |
8 | B120,000 | 900 | 54 Hours | 8 |
9 | B140,000 | 930 | 60 Hours | 9 |
10 | B160,000 | 960 | 66 Hours | 9 |
11 | B180,000 | 1,000 | 72 Hours | 9 |
12 | B200,000 | 1,080 | 80 Hours | 10 |
13 | B220,000 | 1,160 | 88 Hours | 10 |
14 | B260,000 | 1,250 | 96 Hours | 10 |
15 | B300,000 | 1,330 | 104 Hours | 11 |
16 | B340,000 | 1,410 | 112 Hours | 11 |
17 | B380,000 | 1,500 | 120 Hours | 11 |
18 | B420,000 | 1,625 | 132 Hours | 11 |
19 | B440,000 | 1,750 | 144 Hours | 12 |
20 | B460,000 | 1,875 | 168 Hours | 12 |
21 | B480,000 | 2,000 | 180 Hours | 12 |
Tips
- Krakens have limited use against networks that have their Core placed near their netConnections.
- Similar to Worms, Krakens can attack multiple consecutive nodes using a single program.
- Krakens only occupy one Program slot on any given node regardless of the number of merged tentacles.
- Only one Kraken can be installed on each netConnection.
- Nodes with a Portal installed do not count as a netConnection and cannot have the Kraken installed on them.
- On chokepoints, the Kraken will only attack one of the connected nodes, leaving the chokepoint vulnerable to any other securities. Consider bringing Shockers, ICE Walls or Shurikens along if that poses a problem.
- It is not always best to use as many Krakens as possible - consider the placement of the core, the nodes and security in between, the level of your Kraken program and what else you could use extra disk space for when deciding how many to compile.
- [Visual Bug] Rarely, the Kraken will appear to not be severed when one of the nodes along its path is recaptured by the network's defenses.
Trivia
The Kraken program is most likely named after a legendary sea monster with the same name.
It's blurb also reference the famous sentence uttered by Zeus,which is portrayed by Liam Neeson.
Hackers Wikia - Programs | ||
---|---|---|
Beranda | ||
Program | Node | Permainan |
Program Penyerangan |
Pemukul Dinding
Meriam Laser
Blaster
Kraken | |
Program Pertahanan | ||
Program Sembunyi |