Bulgaria  China  Taiwan  Czech  UK  France  Germany  Indonesia  Italy  Japan  Malaysia  Poland  Portugal  Romania  Russia  Spain  Turkey  Vietnam

Battering ram Ion cannon Blaster Kraken
Battering Ram Beam Cannon Blaster Kraken
Maniac Shuriken Shock Worms
Maniac Shuriken Shocker Worms

Summary Edit

Offensive programs are the basic tools of hacking. Viruses such as Beam Cannon, Worms, or a mighty Kraken have the potential to overwhelm any Security Nodes and firewalls on a network by force. This method of attack is referred to as "Brute Force" and differs significantly from the more subtle Stealth hacking. In Brute Force hacks, Defensive Programs are also usually necessary.

Attack Priorities Edit

Different programs have different methods of attack, and some have additional, special abilities. When an offensive program has a choice of which node to attack, it will select a target using the following criteria:

Priority list: (Updated for Patch v1.025 - see Patch Notes)

  1. Security Nodes with a Strength value - These are Sentry, Turret and Black ICE nodes. Other Security Nodes (Guardian, Scanner and Code Gate) are considered regular nodes in this regard.
  2. The Core (including an upgrading Core.)
  3. Black Nodes - Nodes with an installed antivirus.
  4. Partially Black Nodes - Nodes where an antivirus is currently being uploaded.
  5. White Nodes and Upgrading Nodes - Nodes which are upgrading and Nodes where an antivirus is not present. (Including upgrading Security Nodes, but not including an upgrading Core.)
  6. Nodes under the Wraith effect.

Note that this is void for programs which always target all connected nodes.

Attacking Methods Edit

The Wiki lists Programs as having an "Attack Style" and a "Targeting Style":

Attack Style Edit

  • Attacks from Projectile type programs take a small amount of time to reach the target. The Projectile Speed and frequency of projectiles is also listed.
  • Attacks from a Beam type program reach the target instantly. As of Patch v1.011, Programs incur a small delay when acquiring a new target, which is listed as Targeting Delay.

Targeting Style Edit

  • Focused programs such as the Beam Cannon do not change target once they start attacking a node.
  • Dynamic programs such as Blasters and Worms will change target if a higher priority node is targetable.
  • AoE programs such as Shuriken attack all connected nodes.

Trivia Edit

The Brute-Force attack was most likely named after the real Brute-Force attack, were decoders trying many passwords or passphrases with the hope of eventually guessing correctly.

Hackers Wikia - Programs List
Programs Nodes Gameplay
Offensive Programs

Battering ram Battering Ram  Ion cannon Beam Cannon  Blaster Blaster  Kraken Kraken 
Maniac Maniac  Shock Shocker  Shuriken Shuriken  Worms Worms 

Defensive Programs

Icewall ICE Wall  Protector Protector 

Stealth Programs

Access Access  Dataleach Data Leech  Portal Portal  Wraith Wraith 

Ad blocker interference detected!

Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.