FANDOM



  Bulgaria  China  Taiwan  Czech  UK  France  Germany  Indonesia  Italy  Japan  Malaysia  Poland  Portugal  Romania  Russia  Spain  Turkey  Vietnam

This page is currently in English. Please translate into Romanian.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.


Battering ram Ion cannon Blaster Kraken
Battering Ram Beam Cannon Blaster Kraken
Maniac Shuriken Shock Worms
Maniac Shuriken Shocker Worms

Summary Edit

Offensive programs are the standard method of hacking a network. Using attacks such as Beam Cannon, Worms and even a mighty Kraken, a player can overwhelm any Security Nodes placed on a network by force. This method of attacking is referred to as using "Brute Force" and differs significantly from the more subtle Stealth attacks.

Attack Priorities Edit

Different programs have different methods of attack, with some programs also having additional special abilities. When an offensive program has a choice of which node to attack, most programs select a target using the following criteria.

Priority list: (Updated for Patch v1.011 - see Patch Notes)

  1. Active Security Nodes - (Sentry, Turret, Black ICE). Other Security Nodes (Guardian, Scanner and Code Gate) are considered regular nodes in this regard.
  2. The Core.
  3. Black Nodes - Nodes with an installed antivirus.
  4. Partially Black Nodes - Nodes where an antivirus is currently being loaded.
  5. White Nodes and Upgrading Nodes - Nodes which are upgrading and Nodes where an antivirus is not present.
  6. Nodes under the Wraith effect.

If connected nodes fall under the same category, the order in which nodes are connected takes precedence, with nodes that are connected first having priority over nodes which are connected last. [1]

Programs that fire projectiles such as Blasters and Worms can change targets during an attack if a connected node with a higher priority is reclaimed by the defender. Focussed attacks such as the Beam Cannon will select a target and remain targeting that node until either itself or its target is compromised, regardless of changes to its surroundings.

References Edit

  1. http://pastebin.com/JEygg4C6 - Priority Testing
Hackers Wikia - Programe
Pagina Inițială
Programe Noduri Cum să joci
Ofensiv

Battering ram Berbec  Ion cannon Tun cu Raze  Blaster Blaster  Kraken Kraken 
Maniac Maniac  Shock Shocker  Shuriken Shuriken  Worms Viermi 

Defensiv

Icewall Zid de Gheață  Protector Protector 

Invizibil

Access Acces  Dataleach Lipitori de Date  Portal Portal  Wraith Spectru 

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.