FANDOM



  Bulgaria  China  Taiwan  Czech  UK  France  Germany  Indonesia  Italy  Japan  Malaysia  Poland  Portugal  Romania  Russia  Spain  Turkey  Vietnam

Battering ram Ion cannon Blaster Kraken
Battering Ram Beam Cannon Blaster Kraken
Maniac Shuriken Shock Worms
Maniac Shuriken Shocker Worms

Summary Edit


Offensive programs are the basic tools of hacking. Viruses such as Beam Cannon, Worms, or a mighty Kraken have the potential to overwhelm any Security Nodes on a network by sheer force. This method of attack is referred to as "Brute Force" and differs significantly from the more subtle Stealth hacking.

  • Beam Cannons are the basic virus, focusing on a node until it is captured.
  • Shurikens are similar to Beam Cannons, but attack all connected nodes simultaneously.
  • Worms can replicate themselves, quickly spreading throughout a network.
  • Blasters are extremely powerful and stun nodes for a short time, but are slow to install and fire, and take up more space.
  • Battering Rams target Code Gate filters and Guardian shields.
  • Shockers stun connected nodes, preventing attacks and regeneration.
  • Krakens start from the netConnections and head straight for the Core, combining their strength as the tentacles meet.
  • Maniacs deliver massive kamikaze attacks, but can only be used once and take up a large amount of disk space.

Statistics Edit

Each program takes a certain amount of time to be installed on a node, during which the program is not active. However, if the node is recaptured by the network in that time, the program will be lost. Each program also takes a certain amount of disk space, which it occupies in program libraries once it is compiled. Finally, each program also takes a certain amount of time to assemble in the Compiler. Programs can be compiled instantly by using Credits.

Offensive Program Statistics
Program Install
Time
Disk
Space
Compilation
Time
Beam Cannon1.0 Seconds120 Seconds
Shuriken1.0 Seconds130 Seconds
Worms1.0 Seconds31 Minutes
Blaster5.0 Seconds65 Minutes
Battering Ram2.0 Seconds510 Minutes
Shocker0.5 Seconds68 Minutes
Kraken1.0 Seconds78 Minutes
Maniac0.5 Seconds1530 Minutes

Attack Priorities Edit

Different programs have different methods of attack, and may have additional, special abilities such as stunning or attacking every connected node. When an offensive program has a choice of which node to attack, it will select a target using the following criteria:

Priority list: (Updated for Patch v1.025 - see Patch Notes)

  1. Security Nodes with a Strength value - These are Sentry, Turret and Black ICE nodes. Other Security Nodes (Guardian, Scanner and Code Gate) are considered regular nodes in this regard.
  2. The Core (including an upgrading Core.)
  3. Black Nodes - Nodes with an installed antivirus.
  4. Partially Black Nodes - Nodes where an antivirus is currently being uploaded.
  5. White Nodes and Upgrading Nodes - Nodes which are upgrading and Nodes where an antivirus is not present. (Including upgrading Security Nodes, but not including an upgrading Core.)
  6. Nodes under the Wraith effect.

Note that this is void for programs which always target all connected nodes.

Trivia Edit

The Brute-Force attack was most likely named after the real life Brute-Force attack, where decoders would try many passwords or passphrases with the hope of eventually guessing correctly.

Hackers Wikia - Programs List
Programs Nodes Gameplay
Offensive Programs

Battering ram Battering Ram  Ion cannon Beam Cannon  Blaster Blaster  Kraken Kraken 
Maniac Maniac  Shock Shocker  Shuriken Shuriken  Worms Worms 

Defensive Programs

Icewall ICE Wall  Protector Protector 

Stealth Programs

Access Access  Dataleach Data Leech  Portal Portal  Wraith Wraith 

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.