FANDOM


This page can be used for testing everything you need before uploading to a current page.

  • This page isn't protected in any way - Please preserve this message at the top of the page
  • Be respectful of other content currently on here.
  • Please copy and paste the following at the very end of each entry:

<br clear="all" />
~~~~
----

  • Please delete any test information once completed.

Table Transclusions Edit

Reputation TablesEdit

Ranking Stats
Rank Appearance Title Reputation
Required
Rank down when
Reputation reaches
Extra $ per
win condition
Extra B-coin per
win condition
1Rank 01 blackNoob--00
2Rank 02 blackRookie50040050020
3Rank 03 blackTalent75065080030
4Rank 04 blackSkilled1,0009001,75060
5Rank 05 blackExperienced1,2501,1503,500120
6Rank 06 blackAdvanced1,5001,4006,500220
7Rank 07 blackSenior1,7501,6509,500330
8Rank 08 blackExpert2,0001,900 12,000400
9Rank 09 blackVeteran2,2502,15027,000900
10Rank 10 blackMaster2,5002,40055,0002,000
11Rank 11 blackElite3,0002,750120,0004,000


ICE Wall TablesEdit

Program Stats
Program
Level
Buffer
Size
Compilation
Price
1400B8
2495B15
3545B30
4600B60
5660B90
6725B120
7800B150
8880B180
9960B210
101,060B240
111,170B270
121,280B300
131,410B330
141,550B360
151,710B390
161,880B420
172,070B450
182,275B510
192,500B570
202,750B630
213,030B690
Research Stats
Program
Level
Upgrade
Cost
Experience
Gained
Research
Time
Required
Evolver Level
1B12812515 Minutes1
2B1,0243004 Hours2
3B2,0483756 Hours3
4B4,0964008 Hours4
5B8,00042510 Hours4
6B16,00045012 Hours5
7B32,00047518 Hours5
8B60,00050024 Hours6
9B70,00057530 Hours6
10B80,00065036 Hours7
11B90,00072542 Hours7
12B100,00080048 Hours8
13B120,00082554 Hours8
14B140,00085060 Hours9
15B160,00087564 Hours9
16B180,00090072 Hours10
17B200,00093080 Hours10
18B220,00096088 Hours11
19B240,0001,00096 Hours11
20B300,0001,125108 Hours12
21B360,0001,250120 Hours12


Protector TablesEdit

Program Stats
Program
Level
Buffer
Size
Regeneration
Per Second
Compilation
Price
165046B30
274852B60
386060B90
498969B120
51,13780B150
61,30791B180
71,503105B210
81,730121B240
91,988139B270
102,286160B300
112,630184B330
123,024212B360
133,477243B390
144,000280B420
154,600322B450
165,290370B510
176,080426B570
187,000490B630
198,050564B690
209,250648B750
2110,640745B1,000
Research Stats
Program
Level
Upgrade
Cost
Experience
Gained
Research
Time
Required
Evolver Level
1B1,0243004 Hours3
2B4,09645012 Hours3
3B8,00047518 Hours4
4B16,00050024 Hours4
5B32,00057530 Hours5
6B48,00065036 Hours5
7B60,00072542 Hours6
8B80,00080048 Hours6
9B100,00082554 Hours7
10B140,00085060 Hours7
11B160,00087566 Hours8
12B180,00090072 Hours8
13B200,00093080 Hours9
14B220,00096088 Hours9
15B260,0001,00096 Hours10
16B300,0001,080104 Hours10
17B340,0001,160112 Hours11
18B380,0001,250120 Hours11
19B420,0001,375132 Hours12
20B460,0001,500144 Hours12
21B500,0001,750168 Hours12


Data Leech TablesEdit

Program Stats
Program
Level
Visibility
(per second)
Download
Boost
Compilation
Price
128 / second50%B5
226 / second55%B10
324 / second60%B20
422 / second65%B30
520 / second70%B40
618 / second75%B50
716 / second80%B60
814 / second85%B70
913 / second90%B80
1012 / second95%B90
1111 / second100%B100
1210 / second105%B110
139 / second110%B120
148 / second115%B130
157 / second120%B140
166 / second125%B150
175 / second130%B170
184 / second135%B190
193 / second140%B210
202 / second145%B230
211 / second150%B250
Research Stats
Program
Level
Upgrade
Cost
Experience
Gained
Research
Time
Required
Evolver Level
1B5122002 Hours2
2B2,0483004 Hours2
3B4,0964008 Hours3
4B8,00045012 Hours4
5B16,00050024 Hours4
6B32,00057530 Hours5
7B48,00065036 Hours5
8B60,00072542 Hours6
9B80,00080048 Hours6
10B100,00082554 Hours7
11B120,00085060 Hours7
12B140,00087566 Hours8
13B160,00090072 Hours8
14B180,00093080 Hours9
15B200,00096088 Hours9
16B220,0001,00096 Hours10
17B260,0001,080104 Hours10
18B300,0001,160112 Hours11
19B340,0001,250120 Hours11
20B380,0001,375132 Hours12
21B420,0001,500144 Hours12


Access TablesEdit

Program Stats
Program
Level
Visibility
(per second)
Compilation
Price
1162 / secondB12
2156 / secondB24
3150 / secondB36
4144 / secondB48
5138 / secondB60
6132 / secondB72
7126 / secondB84
8120 / secondB100
9114 / secondB116
10108 / secondB132
11102 / secondB148
1296 / secondB164
1390 / secondB180
1484 / secondB200
1578 / secondB220
1672 / secondB240
1766 / secondB260
1860 / secondB280
1954 / secondB300
2048 / secondB320
2142 / secondB350
Research Stats
Program
Level
Upgrade
Cost
Experience
Gained
Research
Time
Required
Evolver Level
1B4,0963756 Hours4
2B8,00047518 Hours4
3B16,00050024 Hours5
4B32,00057530 Hours5
5B48,00065036 Hours6
6B60,00072542 Hours6
7B80,00080048 Hours7
8B100,00082554 Hours7
9B120,00085060 Hours8
10B140,00087566 Hours8
11B160,00090072 Hours9
12B180,00093080 Hours9
13B200,00096088 Hours9
14B220,0001,00096 Hours10
15B260,0001,080104 Hours10
16B300,0001,160112 Hours10
17B340,0001,250120 Hours11
18B380,0001,375132 Hours11
19B420,0001,500144 Hours11
20B440,0001,625156 Hours12
21B460,0001,750168 Hours12


Wraith TablesEdit

Program Stats
Program
Level
Visibility
(per second)
Compilation
Price
1135 / secondB100
2130 / secondB200
3125 / secondB300
4120 / secondB400
5115 / secondB500
6110 / secondB600
7105 / secondB700
8100 / secondB800
995 / secondB900
1090 / secondB1,000
1185 / secondB1,100
1280 / secondB1,200
1375 / secondB1,300
1470 / secondB1,400
1565 / secondB1,500
1660 / secondB1,600
1755 / secondB1,700
1850 / secondB1,800
1945 / secondB1,900
2040 / secondB2,000
2135 / secondB2,100
Research Stats
Program
Level
Upgrade
Cost
Experience
Gained
Research
Time
Required
Evolver Level
1B8,00047518 Hours5
2B16,00055024 Hours5
3B32,00062532 Hours6
4B48,00070040 Hours6
5B60,00080048 Hours7
6B80,00083054 Hours7
7B100,00086060 Hours8
8B120,00090072 Hours8
9B140,00093080 Hours9
10B160,00096088 Hours9
11B180,0001,00096 Hours9
12B200,0001,080104 Hours10
13B220,0001,160112 Hours10
14B260,0001,250120 Hours10
15B300,0001,330128 Hours11
16B340,0001,410136 Hours11
17B380,0001,500144 Hours11
18B420,0001,625156 Hours11
19B440,0001,750168 Hours12
20B460,0001,875180 Hours12
21B480,0002,000192 Hours12


Portal TablesEdit

Program Stats
Program
Level
Visibility
(per second)
Compilation
Price
155 / secondB160
250 / secondB320
348 / secondB480
446 / secondB640
544 / secondB800
642 / secondB960
740 / secondB1,120
838 / secondB1,280
936 / secondB1,440
1034 / secondB1,600
1132 / secondB1,760
1230 / secondB1,920
1328 / secondB2,080
1426 / secondB2,240
1524 / secondB2,400
1622 / secondB2,560
1720 / secondB2,720
1818 / secondB2,880
1916 / secondB3,040
2014 / secondB3,200
2112 / secondB3,360
Research Stats
Program
Level
Upgrade
Cost
Experience
Gained
Research
Time
Required
Evolver Level
1B16,00050024 Hours6
2B32,00057530 Hours6
3B48,00065036 Hours7
4B60,00072542 Hours7
5B80,00080048 Hours8
6B100,00082554 Hours8
7B120,00085060 Hours9
8B140,00087566 Hours9
9B160,00090072 Hours9
10B180,00093080 Hours10
11B200,00096088 Hours10
12B220,0001,00096 Hours10
13B260,0001,080104 Hours11
14B300,0001,160112 Hours11
15B340,0001,250120 Hours11
16B380,0001,375132 Hours11
17B420,0001,500144 Hours12
18B440,0001,625156 Hours12
19B460,0001,750168 Hours12
20B480,0001,875180 Hours12
21B500,0002,000192 Hours12


Luminaar (talk) 17:13, September 10, 2017 (UTC)


Infobox Updates Edit

Program InfoboxesEdit

Luminaar (talk) 21:02, August 30, 2017 (UTC)


Node InfoboxesEdit

Luminaar (talk) 02:44, September 8, 2017 (UTC)


Offensive Strategies Edit

Summary Edit

Successful hacking is central to completing missions and simulations, daily challenges, and generally progressing as a hacker. Hacks can be completed using many different programs and strategies, but programs must be sufficiently upgraded to be effective. Understanding attack priorities, the pros, cons and qualities of brute force and stealth, and the strengths, weaknesses, and unique properties of programs will inform decisions and help conquer any network.


Program Loadouts Edit

Stealth:

  • Pros
    • Hacks cannot be retraced as long as the visibility bar does not reach 3600 before disconnecting
    • Very few programs are needed for each hack
  • Cons
    • Programs become very expensive at higher levels
    • Wraith and Portal take a long time to compile
    • Stealth must be continually upgraded to counter rising Scanner levels on target networks

Shuriken and Shocker:

  • Pros
    • Programs are very cheap
    • Hacks can be relatively quick, compared to other brute Force methods
  • Cons
    • Shockers take 8 minutes to compile and 6 disk space per program
    • Having enough Shockers is crucial to a hack, and could be the sharp difference been success and failure

Kraken and Worm:

  • Pros
    • Very low total disk space
    • Kraken can crush strong nodes on the way to the Core while Worms deal with weaker nodes without wasting programs
  • Cons
    • Defensive programs are almost always needed to defend nodes while Kraken and Worms replicate and move along.
    • Kraken has limited use against networks with the Core near the netConnections

Portal and Maniac:

  • Pros
    • Network security can be eliminated quickly and completely if Portal is well-placed
  • Cons
    • Compilation time is extremely long and significant disk space is required
    • Other programs will be needed for a successful hack, including Access

Blaster and ICE Wall:

  • Pros
    • Very few nodes will be able to hold for long against a Blaster of reasonable level
    • Blasters greatly decrease time spent on difficult nodes such as Code Gates, the Core, and high level storages or Security Nodes.
  • Cons
    • Blaster is slow to attack, making it almost impossible to use effectively against Maelstroms or low-level nodes
    • ICE Walls become expensive very quickly, and many may be needed per hack
    • Chokepoints can be difficult to defend, and Security Nodes must be protected to prevent the network recapturing them while Blasters attack other nodes on chokepoints

Beam, Ram and Protector:

  • Pros
    • Programs are cheap to compile
    • Hacking is intuitive and relatively simple, leading to fewer mistakes
    • A good average capable of hacking almost any type of network
  • Cons
    • Battering Ram and Protector take time to compile
    • While Code Gates may not be much of an obstacle, nodes with very high firewall and protected by Guardian shields may be very difficult to capture without stronger programs

Hacking Goals Edit

Program Placement Edit

Beam Cannon

ICE Wall

  • Strong when installed on nodes with low firewall or Security Nodes which could be recaptured by the network
  • Weak when installed on nodes with poor strategic position to continue hacking

Shuriken

  • Strong when installed on nodes with many connections or nodes connected to one or more strong nodes of higher priority and one or more weak nodes with lower priority but more importance to continue hacking
  • Weak when installed on nodes connected to only one uncaptured node of importance

Data Leech

Access

Protector

  • Strong against chokepoints and high firewall nodes
  • Weak against nodes with low firewall or non-threatening nodes

Blaster

Worms

  • Strong when installed on nodes connected only to captured, weak, unimportant or non-threatening nodes
  • Weak when installed on nodes connected to one or more security nodes or the Core, especially with no other programs to support it

Wraith

Shocker

  • Strong against chokepoints and high firewall nodes
  • Weak against non-threatening nodes

Battering Ram

  • Strong against Code Gates and high firewall nodes protected by multiple strong Guardian shields
  • Weak against very low level Code Gates and Guardian shields, and useless against anything besides filters and shields.

Kraken

Portal

Maniac

  • Strong on chokepoints and against high firewall nodes protected by multiple strong Guardian shields
  • Weak against non-threatening or low firewall nodes

Comparison of Defensive ProgramsEdit

  • ICE Wall and Protector level 1 statistics
Program Firewall Disk Usage Install Time Regeneration
Ice Wall40020.5 secondsNone
Protector65044 seconds45.5 per second

Two ICE Walls cost the same disk space to install as one Protector. It takes an additional 3.5 seconds to install the latter, for a bonus of 45.5 firewall regeneration per second.

Comparison of Practical Usage Edit

The ICE Wall can be installed quickly on a node that was just captured, potentially saving the node and giving you time to install offensive programs. Installing offensive programs first will works for more damage, as long as the node is able to sustain enough damage. This method also allows the node to regenerate until the shield breaks. Use the first tactic on low firewall nodes such as Scanner and the Guardian.

Once installed, even though the Protector has less than the combined Firewall of 2 ICE Walls, the regeneration makes up for it as long as the Protector stays under attack for 3.3 seconds.

Efficiency Edit

Disk usage wise, 2 ICE walls equal 1 Protector.

Be aware of having both ICE Wall and Protector remaining once the node is 100% secure. If this happens, using fewer ICE Walls and letting the Protector take more damage, or using an ICE Wall instead of the Protector for cheaper costs/using less disk space would be more efficient.


References Edit

Hackers Wikia - Gameplay Topics
Gameplay Nodes Programs
Hacking

World Map • Hacks • Missions • Network Logs • Simulations • Reputation 

Networking

Home Screen • Net Building • Resources • Black Market • Patch Notes 

Strategies

Getting Started • Offensive Strategies • Defensive Strategies • Game Tips 

Froste (talk) 20:24, July 21, 2017 (UTC)


Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.