This page is currently in English. Please translate into German.
Articles are constantly being updated.
Please copy contents from the source page before beginning translations.
Source provided for guidelines only.
Please feel free to rephrase the article to suit the needs of the language.
Zusammenfassung[]
Der Kraken ist ein Offensivprogramm, welches sich direkt auf den Kern zubewegt. Sind mehrere, gleichkurze Wege durch ein Netzwerk vorhanden, wird der Weg mit dem kleineren Firewall bevorzugt. (citation needed). Nachdem der Kraken eine Node eingenommen hat, installiert er sich dort neu und greift die nächste Node an. Das wird solange wiederholt, bis er den Kern errreicht hat. Wenn der Kraken den Kern dann eingenommen hat, greift er danach alle Nodes, die mit dem Kern verbunden sind an. Hier video kann man ein Beispiel für einen Angriff mit dem Kraken sehen.
One Kraken program can be installed on each netConnection in a network. They cannot be installed by the user on any other type of node.
Each Kraken program automatically installs one copy of itself on each node it captures. If the next node along its path already has a Kraken installed, their tentacles merge together and they combine their strength while still occupying only one program slot. The strength of a Kraken program on each installed node is equal to its program strength multiplied by the number of Kraken programs that have converged up to that point. As of v1.030, Kraken overwrites worms on a full node. Kraken will not overwrite any other offensive or defensive programs.
They will continue this pattern until they capture the Core, then they will simultaneously attack all hostile nodes connected to the Core, similar to the Shuriken. As of Patch v1.011, the damage to nodes connected to the Core is equal to the Kraken's base program strength with no multipliers. Attacks from the Core do not install the Kraken onto connected nodes.
If a node with Kraken installed is recaptured, all tentacles which pass through the node will be severed and forcibly removed from all nodes after the break point. This does not directly cause any other captured nodes to be lost, even if all program slots become empty.
In this video you can see an example of a network attacked by a Kraken program.
Statistiken[]
Level | Stärke (DPS 1-5x) |
Kompilations Preis |
1 | 36-180 | B60 |
2 | 41-205 | B120 |
3 | 46-230 | B180 |
4 | 52-260 | B240 |
5 | 59-295 | B300 |
6 | 66-330 | B360 |
7 | 75-375 | B420 |
8 | 85-430 | B480 |
9 | 96-485 | B540 |
10 | 108-540 | B600 |
11 | 122-610 | B660 |
12 | 138-690 | B720 |
13 | 156-780 | B780 |
14 | 176-880 | B840 |
15 | 199-995 | B900 |
16 | 225-1125 | B1,020 |
17 | 254-1270 | B1,140 |
18 | 287-1435 | B1,260 |
19 | 325-1625 | B1,380 |
20 | 367-1835 | B1,500 |
21 | 415-2075 | B2,000 |
Level | Upgrade Kosten |
Erhaltene Erfahrung |
Erforschungs Zeit |
Benötigtes Entwicklerlevel |
1 | B8,000 | 475 | 12 Stunden | 5 |
2 | B16,000 | 500 | 18 Stunden | 5 |
3 | B32,000 | 600 | 24 Stunden | 6 |
4 | B48,000 | 700 | 30 Stunden | 6 |
5 | B60,000 | 800 | 36 Stunden | 7 |
6 | B80,000 | 830 | 42 Stunden | 7 |
7 | B100,000 | 860 | 48 Stunden | 8 |
8 | B120,000 | 900 | 54 Stunden | 8 |
9 | B140,000 | 930 | 60 Stunden | 9 |
10 | B160,000 | 960 | 66 Stunden | 9 |
11 | B180,000 | 1,000 | 72 Stunden | 9 |
12 | B200,000 | 1,080 | 80 Stunden | 10 |
13 | B220,000 | 1,160 | 88 Stunden | 10 |
14 | B260,000 | 1,250 | 96 Stunden | 10 |
15 | B300,000 | 1,330 | 104 Stunden | 11 |
16 | B340,000 | 1,410 | 112 Stunden | 11 |
17 | B380,000 | 1,500 | 120 Stunden | 11 |
18 | B420,000 | 1,625 | 132 Stunden | 11 |
19 | B440,000 | 1,750 | 144 Stunden | 12 |
20 | B460,000 | 1,875 | 168 Stunden | 12 |
21 | B480,000 | 2,000 | 180 Stunden | 12 |
Gesamt | B4,444,000 | 23,535 | 1,686 Stunden | 12 |
Tips[]
- Der Kraken ist nur bedingt von Nutzen, wenn der Kern außerhalb der Basis platziert ist.
- Selbst beim Gebrauch von mehreren Kraken gleichzeitig braucht er nur einen Programmplatz pro Node.
- Nodes, die von einem Portal eingenommen wurden, gelten nicht als netConnection. Auf ihnen kann kein Kraken installiert werden.
- Similar to Worms, Krakens can attack multiple consecutive nodes using a single program.
- Only one Kraken can be installed on each netConnection.
- Kraken can save space in libraries with its duplication and on nodes with its convergence, all while consolidating power, which is particularly useful against Code Gates and other tough nodes en route to the Core.
- On chokepoints, the Kraken will only attack one of the connected nodes, leaving the chokepoint vulnerable to any other securities. Consider bringing Shockers, ICE Walls or Shurikens along if that poses a problem.
- It is not always best to use as many Krakens as possible - consider the placement of the core, the nodes and security in between, the level of your Kraken program and what else you could use extra disk space for when deciding how many to compile.
- [Visual Bug] Rarely, the Kraken will appear to not be severed when one of the nodes along its path is recaptured by the network's defenses.
Trivia[]
- The Kraken program is most likely named after a legendary sea monster with the same name.
- “Release the Kraken!” is a catchphrase uttered by Zeus in the fantasy adventure film "The Clash of the Titans."
Hackers Wikia - Programme-List | ||
---|---|---|
Startseite | ||
Programme | Nodes | Gameplay |
Offensive Programme |
Rammbock
Strahlenkanone
Blaster
Kraken | |
Defensive Programme | ||
Stealth Programme |