Hackers Wikia
Advertisement


  Български - Кракен(Български)  简体中文 - 海怪病毒  正體中文 - 挪威海怪  Čeština - Kraken(čeština)  English - Kraken  Français - Kraken(Français)  Deutsch - Kraken(Deutsch)  Bahasa Indonesia - Kraken(Bahasa Indonesia)  Italiano - Kraken(Italiano)  日本語 - クラーケン  Bahasa Malayu - Kraken(Bahasa Malayu)  Polski - Kraken(Polskie)  Português - Kraken(Português)  Română - Kraken(Română)  Русский - Кракен  Español - Kraken(Español)  Türk - Kraken(Türkçe)  Tiếng Việt - Kraken(Tiếng Việt)


This page is currently in English. Please translate into Indonesian.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.



Summary


Release the Kraken! Its monstrous tentacles come from netConnections and head straight towards the Core. The more tentacles join together, the stronger the Kraken is.

The Kraken is a Brute Force Offensive Program which attacks nodes using the shortest possible path towards the network's Core. When there are multiple nodes in a network path, it will attack the node with the highest firewall.

One Kraken program can be installed on each netConnection in a network. They cannot be installed by the user on any other type of node.

Each Kraken program automatically installs one copy of itself on each node it captures. If the next node along its path already has a Kraken installed, their tentacles merge together and they combine their strength while still occupying only one program slot. The strength of a Kraken program on each installed node is equal to its program strength multiplied by the number of Kraken programs that have converged up to that point. As of v1.030, Kraken overwrites worms on a full node. Kraken will not overwrite any other offensive or defensive programs.

They will continue this pattern until they capture the Core, then they will simultaneously attack all hostile nodes connected to the Core, similar to the Shuriken. As of Patch v1.011, the damage to nodes connected to the Core is equal to the Kraken's base program strength with no multipliers. Attacks from the Core do not install the Kraken onto connected nodes.

If a hacker does not maintain control of all the nodes the Kraken is installed on, the tendril(s) will be severed and the Kraken will be forcibly uninstalled from all nodes after the break point.

In this video you can see an example of a network attacked by a Kraken program.

Statistics

  • Notes: While the Kraken is technically allowed to upgrade at the Evolver levels displayed, the Capacity of B-coins that can be held at those levels may not be sufficient to purchase the upgrade.
    More Info here: Max amount of B-coins at Core Level.
Offensive Stats
Level Strength
(DPS 1-5x)
Compilation
Price
1 36-180 B60
2 41-205 B120
3 46-230 B180
4 52-260 B240
5 59-295 B300
6 66-330 B360
7 75-380 B420
8 85-430 B480
9 96-485 B540
10 108-540 B600
11 122-610 B660
12 138-690 B720
13 156-780 B780
14 176-880 B840
15 199-995 B900
16 225-1125 B1,020
17 254-1270 B1,140
18 287-1435 B1,260
19 325-1625 B1,380
20 367-1835 B1,500
21 415-2075 B2,000
Research Stats
Level Upgrade
Cost
Experience
Gained
Research
Time
Required
Evolver Level
1 B8,000 475 12 Hours 5
2 B16,000 500 18 Hours 5
3 B32,000 600 24 Hours 6
4 B48,000 700 30 Hours 6
5 B60,000 800 36 Hours 7
6 B80,000 830 42 Hours 7
7 B100,000 860 48 Hours 8
8 B120,000 900 54 Hours 8
9 B140,000 930 60 Hours 9
10 B160,000 960 66 Hours 9
11 B180,000 1,000 72 Hours 9
12 B200,000 1,080 80 Hours 10
13 B220,000 1,160 88 Hours 10
14 B260,000 1,250 96 Hours 10
15 B300,000 1,330 104 Hours 11
16 B340,000 1,410 112 Hours 11
17 B380,000 1,500 120 Hours 11
18 B420,000 1,625 132 Hours 11
19 B440,000 1,750 144 Hours 12
20 B460,000 1,875 168 Hours 12
21 B480,000 2,000 180 Hours 12


Tips

  • Krakens have limited use against networks that have their Core placed near their netConnections.
  • Similar to Worms, Krakens can attack multiple consecutive nodes using a single program.
  • Krakens only occupy one Program slot on any given node regardless of the number of merged tentacles.
  • Only one Kraken can be installed on each netConnection.
  • Nodes with a Portal installed do not count as a netConnection and cannot have the Kraken installed on them.
  • On chokepoints, the Kraken will only attack one of the connected nodes, leaving the chokepoint vulnerable to any other securities. Consider bringing Shockers, ICE Walls or Shurikens along if that poses a problem.
  • It is not always best to use as many Krakens as possible - consider the placement of the core, the nodes and security in between, the level of your Kraken program and what else you could use extra disk space for when deciding how many to compile.
  • [Visual Bug] Rarely, the Kraken will appear to not be severed when one of the nodes along its path is recaptured by the network's defenses.

Trivia

The Kraken program is most likely named after a legendary sea monster with the same name.

It's blurb also reference the famous sentence uttered by Zeus,which is portrayed by Liam Neeson.

Hackers Wikia - Programs
Beranda
Program Node Permainan
Program Penyerangan

Battering ram Pemukul Dinding  Ion cannon Meriam Laser  Blaster Blaster  Kraken Kraken 
Maniac Maniak  Shock Pengejut  Shuriken Shuriken  Worms Cacing 

Program Pertahanan

Icewall PGE-Dinding  Protector Pelindung 

Program Sembunyi

Access Akses  Dataleach Lintah Data  Portal Portal  Wraith Roh 

Advertisement