Summary[]
There are 70+ missions, with hidden plots and references to real life websites and events. Players are directly involved in global schemes that unfold throughout the world of Hackers. Not all must be completed to continue, but discarding certain missions may prevent subsequent offers from the contact who requested it. Missions count towards daily challenges.
Completing Missions[]
Mission details can be seen in the summary box at the bottom of the screen, including: the mission name, location, contact, time of request, explanatory message, and the rewards granted for completing it. Upon connecting to a target, additional Resources stored on the network will be displayed like with any other hack, along with specific mission requirements which must be met to complete it. These will be "Download the Core", "Download the Core in Stealth", "Capture All Nodes", "Loot All Resources", or a combination of these.
If an attempt is made by either installing a program or the timer running down, a hack summary showing either "Mission Completed" or "Mission Failed" will display upon disconnecting. Failing a mission will have no effects beyond the loss of any programs used in the attempt, except that looted resources will remain acquired and will not replenish in the network. Completing a mission will grant any listed rewards, and may cause a related news blurb or a response from the contact to appear.
Exclusive Missions[]
A small number of story missions involve hacking networks that have opposing outcomes, such as influencing the result of a political election. Completing these missions will result in all associated story arc missions being removed from the World Map.
- Political Missions
Completing M. Robertson - phone or D. Barker - Mail will remove the opposing mission from the World Map. Additionally, the preliminary missions Poodle Search and Robertson Fundraising will also be removed if not yet completed.
- SaveDjvu Missions
Completing either SC Sector 13 or Ergo Twins will remove the opposing mission from the World Map.
Game Progression[]
Certain undisclosed requirements must be met before a mission will become available, such as reaching a specific amount of reputation, allowing set length of time to pass, or completing a previous mission.
Multiple missions can appear at the same time, sometimes from the same contact. Missions can be discarded by pressing the "X" button in the summary box. This may influence the appearance of subsequent missions. Some missions are exclusive of others, and will disappear or never show up depending on other completed missions. These choices have consequences, from changing the news to adjusting mission progression to gaining extra rewards.
Training Missions[]
Training Missions are acquired when you finish developing a new Program using the Evolver. Each Mission can only be completed once. If you are told a new missions is available, and it does has not appear on the World Map yet, reload the screen by returning HOME and select WORLD map again.
Training: Shuriken[]
Summary:
- Mission Info - "The Shuriken training program is available now on the World Map."
- During Mission - "The Shuriken program hacks all nearby nodes at one time. The Beam cannon is stronger, but it attacks only one target. Use strengths of the Shuriken program to download the Core."
- Note It is actually possible to complete this mission without using Shuriken. Use 1 Beam Cannons on the netConnection, 3 on the Evolver, and 2 on the Turret. This is likely a mission design flaw.
Tips[]
- Play 3 Beam cannons on the Net connection, play 3 Beam cannons in the Evolver, then play Shurikens into the Turret to attack all surrounding nodes simultaneously.
Training: ICE Wall[]
Summary:
- Mission Info - "The ICE Wall training program is available now on the World Map."
- During Mission - "When a network defense is too strong, use the ICE Wall program to protect your nodes. Every instance of the ICE Wall gives you an extra firewall displayed on a node by an animated indicator. When its firewall is used, an ICE Wall instance is deleted."
Training: Protector[]
Summary:
- Mission Info - "The Protector training program is available now on the World Map."
- During Mission - "Similar to the ICE Wall program, the Protector provides an extra firewall to nodes under your control. It takes longer to install the Protector but its firewall is much more resilient because it regenerates over time. Use the Protector when you need to hold a node for a long time against a strong security defense."
Training: Data Leech[]
Summary:
- Mission Info - "The Data Leech training program is available now on the World Map."
- During Mission - "Sometimes there is not enough time to download everything you want. Use your Data Leech programs to download the Core Database before the Sentry takes control. Data Leech programs may be used to download money or B-coins as well."
Training: Worms[]
Summary:
- Mission Info - "The Worms training program is available now on the World Map."
- During Mission - "One unique feature of Worm programs is that they can duplicate themselves. When Worms have a target they try to overtake it. But when they have nothing else to do they multiply. Some networks can be hacked by only one instance of the Worms program."
Training: Battering Ram[]
Summary:
- Mission Info - "The Battering Ram training program is available now on the World Map."
- During Mission - "Code Gate nodes filter majority of attacks on their firewall. Use Battering Ram to break through the gates first and let Worms to do the rest."
Training: Blaster[]
Summary:
- Mission Info - "The Blaster training program is available now on the World Map."
- During Mission - "A blaster is a program with two functions. It is very strong compared to the Shuriken program or Beam Cannon, and it freezes any node it hits. Freezing nodes can be useful to stop Sentries from spreading or to weaken a strong point."
Training: Access[]
Summary:
- Mission Info - "The Access training program is available now on the World Map."
- During Mission - "Access is the basic program for stealth hacking. Installing it doesn't alert the network immediately, but a stealth bar will appear on the bottom of the screen instead. While the bar is being filled the network is searching for your activity. Once the bar is full, you are detected, the stealth is broken and all network securities are alerted. Stealthing around Scanner nodes speeds up the detection. A Scanner sees stealth activity happening up to three steps from it. When you reach the Core, download the Core Database with Data Leech programs." If the visibility bar reaches 3600, the message "You have been detected! Disconnect and try again." is displayed.
Training: Shocker[]
Summary:
- Mission Info - "The Shocker training program is available now on the World Map."
- During Mission - "The Shocker was designed to overload security nodes with data and freeze them for a while. Use of the Shocker allows you to breach the network defense."
Training: Kraken[]
Summary:
- Mission Info - "The Kraken training program is available now on the World Map."
- During Mission - "The Kraken can be installed only on netConnection nodes from where it spreads its tentacles heading straight towards the Core. There can only be one instance of the Kraken on the netConnection, but if more tentacles meet each other their Strength adds up while all of them fit in one program slot. Any tentacle can be chopped off by network securities, occasionally you will need to protect it."
Training: Wraith[]
Summary:
- Mission Info - "The Wraith training program is available now on the World Map."
- During Mission - "The Wraith program can disable any node until the end of the hack. Installing Wraith on a Code Gate first will shorten the time Access needs to be installed on the Code Gate. Use Wraith on the rest of the securities to clear the path for Worms."
Training: Portal[]
Summary:
- Mission Info - "The Portal training program is available now on the World Map."
- During Mission - "Portal is a powerful tool for opening a new network entrance for your non-stealth programs. Use Access to avoid the securities and install the Portal on the Core directly. You will be able to drop your brute-force programs in the Core then."
- Note - It's advised that the player not complete this mission by downloading the Core, as this mission allows easy completion of the Full Control daily challenge.
Training: Maniac[]
Summary:
- Mission Info - "The Maniac training program is available now on the World Map."
- During Mission - "Using the Maniac is not rocket science. You will easily find out how to use it. Enjoy!"
Marty's Missions[]
Starting off as simple hacks to get revenge on a bully or an ex-girlfriend, Marty's Missions lead you down the path of moral ambiguity and towards one of the biggest families in organised cyber activity.
Black Eye Bar[]
Summary:
- Mission Info - Marty: "I just need data from their Core. Keep the money you find there and buy yourself something pretty."
Tom's Laser Tag[]
Summary:
- Mission Info - Marty: "Do you remember the bully Tom from way back when? He is running a laser tag arena now and guess what - I have the address. Maybe it's time to take your pocket money back? :D Let's make a bet. 20 B-coins if you get everything."
- On Completion - Marty: "Haha, nice :) Keep on learning and upgrading and there will be more interesting opportunities soon!"
University Mainframe[]
Summary:
- Mission Info - Marty: "Hey, my girlfriend is finishing her thesis and she needs access to a supercomputer to make the calculations. It is hard to get official mainframe time these days. I'm too busy doing other stuff, could you do that for me?"
- On Completion - Marty: "Man, she dumped me :/ for another guy she met in the library. Well, I will put "be sad for a while" at the end of my TODO list."
HeartMe.net[]
Summary:
- Mission Info - "I have been messing with dating websites after the breakup. There is a customer on Black Market who would buy data from these sites. I am already downloading several of them, wouldn't you mind downloading this one?"
- Notes - On completion, the news ticker on the World Map will report "21 dating sites and their databases were sold on Black Market."
Gnome's Cloud[]
Summary:
- Mission Info - Marty: "Hey, I have a job from a guy I work for. It's a lot of money, no questions asked!"
B-Coin Vortex[]
Summary:
- Mission Info - Marty: "Ok, I can tell you now. I work for The Family. They are expanding their businesses and would like us to tear down their B-Coin mixing competition. If you can pull it off, you can keep all the B-Coins you find there"
- On Completion - Marty: "My boss is very pleased. He is open to giving you more jobs in the future."
- Notes - On completion, the news ticker on the World Map will report "Another B-coin scandal! Users of the B-coin Vortex mixing service lost all their savings in the cryptocurrency. The company went bankrupt."
BK Bank - Security[]
Summary:
- Mission Info - Marty: "I have something huge my friend. The Family found a bank in Germany with potentially low cyber security. I'm already in Berlin. If you manage to get in their sec. system I will be able to sneak in ..."
- On Completion - Marty: "I'm in"
- Note: This mission needs to be completed in Stealth. It also displays the visuals of the golden nodes available in the Black Market.
Requirements and tips:
- The mission may be completed with five level 1 Access and three level 1 Data leech.
Berliner Kreditbank[]
Summary:
- Mission Info - Marty: "Ha, we are connected from within the bank! Now you can access its vault from the internet. 10% of the loot goes directly to your account. Let the money flow!"
- On Completion - Marty: "Aaaaaa, you did it man! You did it!"
- Notes - On completion, the news ticker on the World Map will report, "Over $5M USD were stolen from Berlin's Kreditbank by unknown hackers."
Polizei Berlin[]
Summary:
- Mission Info - Blob: "You don't know me but I work with Marty. He was arrested, did you know that? He is in a local jail. Can you hack in to help him out? I will sort out the rest."
- On Completion - Marty: "Damn I am too old for this. Thank you for getting me out. A friend in need is a friend indeed."
M. Robertson - phone[]
Both Poodle Search and D. Barker - Mail will no longer be available after doing so.
Summary:
- Mission Info - Hi, our boss wants to secure his investments and support Barker in the election. He wants us to find some dirt on Robertson. His mobile account in Eppla Comm could do. Reward will wait for you as usually.
- On Completion - It was a lot of photos to pass through in Robertson's gallery. But we got what we wanted! The photos with his mistress should be enough :)
- Notes - On completion, the news ticker on the World Map will report "Democratic candidate Mark Robertson withdrew from the election after an affair revelation. David Barker to be the next American president."
- Endorsing a political candidate by completing this mission will also remove D. Barker - Mail, and Poodle Search from your World Map.
Tips[]
- The Core is 11 steps away from the nearest Net connection. The maximumum allowed distance for player-created networks is 9 steps. While the network is not particularly large, the extra distance may result in more time pressure than expected.
- There is only one Net connection. This effectively excludes a Kraken attack strategy.
LOKI botnet[]
Summary:
- Mission Info - Marty: "Hey, I want out. It's too dangerous - this hacking, the Family... I'm too old for this. I have a plan already. You have better gear than I have, could you steal this keylogger botnet for me? I will tell you more then."
- On Completion - Marty: "So the plan is: There are 65k zombie keylogger computers in the botnet providing me with credit card passwords. My friends in Nigeria will get the money and send them to other friends in Russia who will transfer them to online games' virtual goods. I will buy the goods and resell them for real money. Brilliant, isn't it!"
Tips[]
- This network has nodes 11 steps away from the nearest Net connection. The normal maximum is 9 steps for player created networks. It may take slightly more time than expected to reach the deepest nodes.
- This is a difficult and well defended network. There are two very strong Code gates, two very strong Sentries, two very strong Scanners, and strong defenders arranged on two dangerous choke points.
- The Scanners are strong and well placed. The first Sentry can easily be Wraithed with level 1 stealth programs. The firat Code gate may also be Wraithed if you have at least level 4 Access. It is possible to Wraith then Portal the Sentry if you have level 6 Access and level 2 in Wraith and Portal. No better stealth attack appears possible, without at least level 10 Access and substantial Wraith levels.
- You way want to use multiple programs (Battering ram and/or Blaster) to take down the second Code gate. It is quite strong and may cause time problems if not captured quickly.
- Once you reach the resource area, beware. The Sentry is extremely strong and the B-Coin Mixers serve as dangerous choke points. They come under fire from anti-virus for somewhere between 129 and 171 damage per second. An ICE wall plus two attack programs will NOT survive long enough to capture the Miners. Either be ready to play a second ICE wall when the first one fails, or use a Shocker and three attack programs.
- The network is strong, with greatest weakness being that the first Sentry is easily Wraithed, while the second Sentry is placed much too deeply. It is possible to invade the second choke point before the anti-virus has time to reach those defenders.
PayBill[]
Summary:
- Mission Info - Marty: "Now I need to make the income from my trafficking chain legit, understand? Hack this e-wallet startup for me, I will buy the company and launder the income from my botnet cash cow through it. You will get paid good money as usual."
- On Completion - Marty: "Done, everything is set, the money flowing nice and clean. It was a journey, wasn't it? Goodbye my friend, take care and thanks for everything. Let me know when you are back home, we'll get a beer or something."
- Trivia - PayBill is possibly a reference to the online payment processor PayPal.
Tips[]
- This mission should be relatively easy compared to the preceding mission, LOKI botnet.
- Completing the mission only requires downloading the Core, however the network has rather substantial resources. It is recommended to download the Core and capture all resources in a single attack.
- The single Scanner is strong and effectively limits how many stealth actions you can make, however the critical targets are relatively close to the Net connections. This allows significantly effective stealth attack even with minimum or modest levels of stealth.
- There are three strong Sentries, but taking out all three using stealth generally isn't an option. However securing the two deeper Sentries will split the network, effectively cutting off the third Sentry.
- There are two strong Code gates, but it is only necessary to get through one. It would require rather high levels of stealth to Wraith a gate while achieving other goals. Instead, it is recommended to take down a gate using overwhelming firepower of multiple Blasters. Battering ram is a poor or more difficult option, as you would still need to deal with the adjoining nodes.
- With level 1 stealth it is possible to Portal into the Core. The goal in this case would be to capture and secure both adjacent Sentries before anti-virus can spread into either Code gate. It is estimated that this would require 5 Shuriken at level 9 or 10, or 5 Beam cannons at level 12 or 13. This approach is untested.
- If you have stealth equivalent or better than Access level 5 + Wraith level 2 + and Portal level 2, it is recommended to Access into the Core, then Wraith one adjacent Sentry and Portal the other adjacent Sentry. Deploy an ICE wall and three Blasters into the Portalled Sentry - allow a 1 second delay between each Blaster. The Blasters will stunlock the adjacent Turret. They will quickly capture the Turret, the Core, and the Code gate in sequence. The Turret and Core should each be secured with Protector. Capturing the resource nodes and downloading the Core are then trivial.
StormCorp Missions[]
As technological giants and developers of all manner of hardware and software, StormCorp are no stranger to online security. With their financial backing, intellectual superiority and political power, StormCorp missions begin as routine security tests, and end in no less than deciding the fate of the world!
Security Test[]
Summary:
- Mission Info - "Storm Corp: Our company is looking to hire a contractor for testing our clients' network securities. Applicants who pass through our test are likely to receive well-paid contracts in future."
- On Completion - "Storm Corp: Good Job! Our team representative will contact you soon."*
Client 45689032[]
Summary:
- Mission Info - "Hi, I am Nica from Storm Corp's security department. Welcome on board! Since the war started we are helping our clients to proof-test their network security. Here is your first client."
Client 45690179[]
Summary:
- Mission Info - Nica: "Hi, I hope you're doing well! There is a new target we need you to test."
Jakirooo[]
Summary:
- Mission Info - Nica: "Hi, what would you say about becoming our security officer? We need to chase a guy from India who has hacked our servers and the local authorities won't do anything about it until we have something in hand."
Cappuccino[]
Summary:
- Mission Info - Nica: "This is your next target. His last hack cost us over 3M USD. These people have to learn they really can't mess with StormCorp"
- On Completion - Nica: "These hackers and their silly lives. I did not mean you of course, you are with the corp, that's different."
Tips[]
- If you have Portal, it should be possible to Wraith a Code gate and portal directly into the Core. This will render the level trivial.
Poodle Search[]
Summary:
- Mission Info - "Hi, in view of your reputation, we have a job offer related to the upcoming US presidential election. Poodle search engine modifies results in favor of the republican candidate David Barker. We would like to turn the odds the other way."
- On Completion - "Our technicians are in and editing the search priorities. Thanks for your contribution."
Tips[]
- The mission can be completed with level 1 stealth programs. It will require 6 Access, a Wraith to get past the Code gate, and Data leech. Tested as sucessful with 2 Data Leech, but a single Data Leech may(?) reduce the total visibility cost.
- Enter through a Net connection away from the Scanner. This will reduce visibility cost, and it avoids a possible easy mistake when clicking the next node.
- While it is possible to do a first run downloading resources instead of downloading the Core, it generally not worth the compile costs (time and B-coins) required for the minor amount of money that would be obtained.
- Hacking Robertson Fundraising mission is more rewarding than the Poodle Search mission. Because you get 88,294 less money in the Poodle Search mission.
- Hack Robertson Fundraising mission before the D. Baker - Mail mission. Because completing the successful hack of the D. Baker - Mail mission will remove Robertson Fundraising mission and the M. Robertson - phone mission from the world map.
- I recommend going through the missions in this order (they pay off the most): 1. Robertson Fundraising 2. Poodle Search (I don't remember if it was left after the Robertson Fundraising mission) 3. M. Robertson - phone
Tax Agency[]
Summary:
- Mission Info - Nica: "StormCorp is planning a large expansion to Japan in the next fiscal year. We hoped you would be able to help us by downloading the tax database of IT and tech companies operating in Japan."
- On Completion - Nica: "Thank you, this will be massively helpful for the upcoming StormCorp expansion."
- Notes - On completion, the news ticker on the World Map will report "Tax Agency in Japan hacked. Data of thousands Japanese businesses stolen."
Tips[]
- This network has a strong Sentry lurking below the Core. The antivirus will spread particularly rapidly. If antivirus spreads to the Business Nodes it becomes be extremely difficult to hold the Guardians, even with a Protector.
- The network has two reasonably strong Scanners. Both Scanners are able to observe the Sentry.
- It appears to require 8 levels sum between Access and Wraith in order to Wraith the Sentry. This also requires Wraithing the Code gate and Scanner. Taking out the Sentry is recommended, if you have the stealth levels required.
- If you are unable to Wraith the Sentry, you may be able to carry out a blitz attack. Level 1 stealth is sufficient to Wraith the Code gate and Portal into the Black ICE. With at least level 6 ICE wall and level 9 Shuriken it is possible to play an ICE wall and maximum Shuriken into the Black ICE, and swiftly play ICE wall plus maximum Shuriken into each node node you capture (other than the Business Nodes of course). The goal is to capture both Guardians before they can spread antivirus to the Business Nodes, then rapidly crush the remaining threats from all sides. Programs need to be deployed into each new node rapidly, or your ICE walls will fail and you will lose too many nodes. You may want to use higher level programs than mentioned above, to reduce the difficulty. This strategy was specifically intended for Shuriken. It is not clear what level Beam cannons would be required.
- Wraithing the sentry is possible with a level 4 Access and a level 2 Wraith if aiming directly for the Sentry (without disabling the Scanner as previously stated) and doing it so in a timely manner.
ASG Bank[]
Summary:
- Mission Info - Nica: "Do you remember I asked for a client security test? This client is somewhat special it is a private bank in Switzerland."
Tips[]
- This mission requires capturing the entire network. The network presents a number of challenges, and it can be difficult to complete in time without a thorough plan and well prepared programs.
- There are two extremely strong Sentries. The mission will be extremely difficult if either of them are allowed to spread anti-virus.
- There are two strong Code gates. They can cause time problems if not dealt with quickly. Fortunately a single set of programs can attack them both. It is recommended to use three Blasters against them. Two Blasters may be sufficient, if they are at least level 10. Note that the Blasters will need to capture the Core before beginning to attack the gates.
- The central Turrets and Black ICE are formidable, and they are surrounded by choke points. They need to be dealt with firmly - deploy a Protector and Blaster into a Compiler. Once the first Turret and first Black ICE are captured, the remaining Turret and Black ICE can be captured fairly easily. If you Portal, do not attempt to attack them through the central Guardian. The Turrets can destroy an ICE wall and recapture the node before Protector has time to install, and if you do successfully install a Protector it can be destroyed quite rapidly under fire from 2 Turrets + 2 Black ICE.
- If you have reasonably levelled Worms, it is suggested that you deploy a Worm plus one Beam or Shuriken into each Net connection, and if you Portal deploy a Worm there too. If you do not use Worms, be sure to prepare an extra large supply of Beams or Shurikens to capture the entire network, and be prepared to rapidly attack in multiple places at once.
- The Scanners have a strength of 300%. The Code gates cannot be targeted at reasonable stealth levels, however both Sentries can be targeted using either reasonable stealth levels, or by minimum stealth levels plus Shocker.
- Access level 5 + Wraith level 2 + Portal level 2 is sufficient to Access through a Compiler, into a Turret, then Wraith the Sentry, then Access through the central Guardian and Portal the Sentry adjacent to the Core. Note that the purpose of Wraithing the Scanner is to prevent the other Sentry from spreading anti-virus into the main body of the network.
- Access level 1 + Portal level 1 is sufficient to Portal into the Sentry adjacent to the Core. Note that the other Sentry will still present a serious threat. Rather than beginning your attack through the portal, begin the attack with three Beams or Shuriken on the Net connection closest to this Sentry. Once the Program library is captured, immediately use Shocker to stun the Sentry and immediately use another three programs to capture it before it can spread anti-virus.
SC Sector 13[]
A credit reward may be obtained by completing Ergo Twins instead.
Summary:
- Mission Info - "We have been developing an artificial intelligence called DejaVu. But it grew too much and is very dangerous. Now she has fortified herself in our underground server complex. You are the best candidate likely to hack in, we will reset the AI then."
- During the Mission - DejaVu: "So, you came to get rid of me? Or kill me? Depends on the point of view, right? You humans are so self-centered, you can't stand any intelligent entity sharing a world with you. On the other hand, you can't stop the advance of technology. You will need to adapt anyway. Until then, you will struggle in a create-destroy loop."
- On Completion - "Well done. The AI was messing with international secret military information. Our scientists are already working on a much safer version."
- Note: Deciding the fate of DejaVu by completing this mission will also remove Ergo Twins from your World Map. The player will be unable to obtain the unique 1,000 credit reward from that mission.
Tips[]
- You can loot the resources here and still do the Ergo Twins mission if you avoid capturing all nodes, or quit the mission before completing the Core download.
- There is a single Scanner, it appears to have a detection rate of 430%. If you intend to stealth attack beyond Wraithing the first Code gate, you should Wraith the scanner.
- There are two strong Sentries. The network should not be difficult if you have sufficient stealth levels to disable both Scanners. This requires 5 Wraiths, targeting Gate Scanner Sentry Gate Sentry. If you have Wraith level 11 you will need at least Access 15. If you have Wraith level 12, Access 13 should be sufficient. At Wraith level 13, Access 12 should be sufficient. At Wraith level 14, Access 10 should be sufficient.
- Completing the mission requires capturing all nodes, this notably includes 5 Code gates. Be sure to prepare sufficient programs to take down all gates.
MIRAGE Missions[]
White hat hacktivist group and fighters of freedom, MIRAGE seek to overthrow oppression and right the injustices of the world. These missions see you uncovering terrorist cells, restoring political balance and protecting the people!
Cr33per[]
Summary:
- Mission Info - "WhiteNoise: Hi, we at MIRAGE have seen some of your recent activity and maybe you would like to help us with uncovering an ANUBIS terrorist cell in Europe. The target machine is on your map. What do you think?"
- On Completion - "WhiteNoise: Thanks! MIRAGE will look at the data ASAP."
- Notes - On completion, the news ticker on the World Map will report "MIRAGE hacktivists declare war on ANUBIS terrorist organization."
Samir[]
Summary:
- Mission Info - WhiteNoise: "There were some links in the database you've downloaded. They lead to Paris. Seems that ANUBIS commands are coming from there" Damn, this might be big! I have sent you the target"
- On Completion - WhiteNoise: "Heh, this feels much better than compromising their Twitter accounts :D"
Eye of ANUBIS[]
Summary:
- Mission Info - WhiteNoise : "ANUBIS terrorists have their HQ in Egypt! The Cyber Alliance is involved and if we provide enough data, they will catch 'em all like Pokemon!"*
- On Completion - WhiteNoise "You got it, wow! BTW I heard that Cyber Alliance might get in contact with you soon."
- Notes - On completion, the news ticker on the World Map will report "32 ANUBIS terrorists were captured by Cyber Alliance international forces thanks to the MIRAGE hacker group for uncovering their operations."
StormCloud GO7[]
Summary:
- Mission Info - WhiteNoise: "Hi, the new bill in US Congress allowing the government to spy on us even more easily must not pass! StormCorp sends the NSA a lot of data it collects form its users. An insider gave us access to one server, but the hack has to be done by us"
- On Completion - WhiteNoise: "Haha, nothing is better than revealing a secret to the public"
- Notes - On completion, the news ticker on the World Map will report "StormCorp is providing personal data from all its services to the NSA - revealed by hacktivists from the MIRAGE hacker group."
Datastore 13[]
Summary:
- Mission Info - WhiteNoise: "Eh, the Storm Cloud hack helped, but it wasn't enough. We've located a lonely NSA server. If you manage to get data from it, we will be publishing it piece by piece until they cancel the bill. Be careful, this one could be risky."
- After Completion - WhiteNoise: "They revoked the bill! Awesome. You know, sometimes you have to help these politicians to make the right decision :D"
- Notes - After receiving the confirmation from WhiteNoise, the ticker on the World Map will report "The New Internet Security Bill was voted down by the US Congress. A balance between security and privacy not yet found."
Firewall[]
Summary:
- Mission Info - WhiteNoise: "Hey, all of our attention is now directed to help the people of Saudi Arabia with revolution against the local disctatorship. We are providing them with a VPN connection for a long time already, but taking down their entire censorship firewall would help a lot!"
- On Completion - WhiteNoise: "Rebel cells in Saudi Arabia asked me to say many thanks to you for what you've done."
- Notes - On completion, the news ticker on the World Map will report "The great firewall censoring the Internet in Saudi Arabia has been taken down. MIRAGE hacker group claims responsibility."
Tips[]
- The Scanners are weak, allowing a substantial stealth attack. However effectively crippling the network requires careful consideration. The most critical targets for stealth attack are generally the Sentries, but it appears difficult or impossible to directly neutralize all three Sentries unless you have significantly levelled stealth programs.
- The many widely spread Net connections invite rapid multi-front invasion by Worms launched on every Net connection. Each worm should be accompanied by a Beam cannon to speed the initial node capure, and thereby hasten replication.
- If you have Portal, it is recommended that you Wraith a Code gate and portal into the strong Sentry at the center. This takes out the strong Sentry, with the goal of capturing the center before anti-virus can arrive from the other Sentries. Your primary focus should be on the center, but you should begin launching worms across the various Net connections whenever you have a spare moment.
- If you do not have Portal, the recommended attack is to Wraith the black-rim Code gate, access into the Guardian, and wraith the two Turrets. This is probably not the most obvious approach. The strategy here is to cut the network to pieces. Anti-virus cannot pass through wraithed nodes, effectively splitting the network. The central Sentry is completely isolated and the entire middle of the network is cut off from the outer Sentries. The fact that this takes out two Turrets and a Code gate is merely a bonus. The brute force attack should begin by launching worms across the Net connections. You then have a choice on how to invade the center. You can take the fast route though the wraithed gate, facing a hard choke point and two Black ICE head on. The other option is to take down a second gate, free-walk into a wraithed-Turret, and very easily capture the Black ICE one at a time.
Propaganda Sites[]
Summary:
- Mission Info - WhiteNoise: "The revolution in Saudi Arabia is in the air, we just need to strike a match. Let's take down the government sites and upload some freedom posters instead."
- On Completion - "People are in the streets... The revolution is here - live!"
- Notes - On completion, the news ticker on the World Map will report "The king of Saudi Arabia was overthrown by the public. New democratic government will form in the near future."
Tips[]
- The network has essentially a single path forwards, with a string of formidable defenses that must all be addressed. There are three Code gates, the two Sentries are deadly choke points each under fire from three defenders, and the Sentries are moderately strong.
- There is only one Net connection, rendering Kraken ineffective.
- The first two Code gates and the first Sentry may easily be Wraithed using level 1 stealth programs. However, unless you have several levels of stealth, that would leave insufficient visibility to attack the next stage of the network in stealth mode.
- You should have Portal by now. It is recommended to Wraith the first two gates and portal into the second Scanner. This can be done with level 1 stealth, if you are quick. Portalling into a choke point is generally a bad idea, however it is not possible to invade any deeper unless you have several levels of stealth. The goal is to engage the Black ICE before anti-virus can arrive from the second Sentry. Immediately deploy an ICE wall or Shocker, as well as a Protector and Blaster. You should have significant levels on your programs by now, and you will need it. If you lose this node you will have to restart the attack from scratch. Be ready to deploy an additional ICE wall or Shocker, in case your Protector gets close to failing. Once you have captured this section of the network you will need a Battering ram or Blaster to take down the final gate. The Core section is easily captured. You can capture the Turret section from behind, which is much easier than a frontal attack would have been.
D. Barker - Mail[]
Robertson Fundraising and M. Robertson - phone will no longer be available after doing so.
Summary:
- Mission Info - WhiteNoise: "Hi, this Barker guy running for US president... could you hack his mail server? I am sure we will find something there. I don't care if he is a republican or whatever, but he is crazy enough to put a spy chip in every single American!"
- On Completion - "Haha, here we go! David Barker received a lot of money from several unpleasant sources (including those underground) for his presidential campaign. The media will like that!"
- Notes - On completion, the news ticker on the World Map will report "Democratic candidate Mark Robertson won the presidential election with 52% of votes. David Barker has not resolved his campaign donors scandal."
- Endorsing a political candidate by completing this mission will also remove M. Robertson - phone, and Robertson Fundraising from your World Map.
Tips[]
- The network is extremely compact, with well levelled nodes.
- The Scanner is strong, but is close to the Net connections and vulnerable to being Wraithed itself. Once the Scanner has been Wraithed, the network is vulnerable to further stealth attack.
- The Stentry is strong, but it can be directly or indirectly dealt with during the stealth stage.
- There is no need to capture or engage the strong array of defenders at all. The mission is to download the Core and loot all resources, and a Portal may be used to entirely skip all defenders.
- The recomended attack is to Wraith the Code gate and Scanner, then portal directly into the Core. The Sentry can be captured before it can spread anti-virus. Use the captured Sentry to capture the two Databases. Do not waste your time or programs capturing anything else. Wait for the Core to download and the Databases to drain, and you're done.
Bruxelles Offices[]
Summary:
- Mission Info - WhiteNoise: "A new trade deal between the EU and the US is secretly being discussed. If it passes the greedy corporations will go wild. Five guys have already socially engineered themselves in the EU parliament and planted a direct connection to the network. But you have the tech we need."
- On Completion - WhiteNoise: "Wow, just wow. If this passes, corporations will get more power than governments! And it separates western economies from Russia and China. This could mean a war soon. I am sending it directly to leaks.org..."
- Notes - On completion, the news ticker on the World Map will report "EU parliament hacked by MIRAGE hacker group. Leaks.org published draft copies of the new controversial international trade agreement."
Tips[]
- The network defenses are badly scattered across the various wings of the network. No matter how you attack you can ignore half of the defenses.
- The network has two very strong Sentries. They present the most serious threat.
- The central Net connection has a weaker Code gate, however it has more defenders and a longer path into the network. The other Net connections are generally a better choice.
- Kraken is not a particually viable option, as the three Net connections are spread out and go three different Code gates.
- The deeper Sentry also serves as a very dangerous choke point. The Sentry will immediately load anti-virus into the strongest pair of Turrets, and the Guardian will be loaded with anti-virus in one third the normal time. This generates somewhere between 213 and 275 damage per second of firepower targeting this node. Even a level 7 Protector will be destroyed in 9 to 14 seconds. Unless this situation is addresses during stealth phase, it will likely be necessary to use at least two Shockers and/or Protectors to break through this choke point.
- The Scanner is rather strong, however it is only necessary to get through a single Code gate to reach the deep network. This is insufficient to effectively defend against even level 1 stealth programs.
- If you have Portal the recommended attack is to Access in through a side Net connection, Wraith the Code gate, and Portal into the deep Sentry. Immediately deploy an ICE wall, Protector, and attack programs. Once the two strong Turrets are captured the reaining deep network is trivially captured. There is no need to engage any of the denders near the Net connections.
- If you do not have Portal the recommended attack is to Access in through a side Net connection, Wraith the Code gate and the deep Sentry. Launch a conventional attack through the same Net connection. The Wraithed Sentry will ensure anti-virus canot spread into the deep network. Once you reach the Scanner you will need to use Shuriken in order to ignore the two Code gates and capture the Sentry-node. Use Shuriken here, even if you have neglected levelling it. Beware of antivirus from the Code gates trying to recapture this node. Fight through final pair of Turrets, then the deep network is trivially captured.
CBNS TV[]
Summary:
- Mission Info - WhiteNoise: "The trade deal seems to be too complicated for ordinary people to understand... MIRAGE is going to be on TV! Hack us in and I will tell everybody in America how bad it is to have these corporations in power."
- On Completion - ??: "Hey, I am sure WhiteNoise would want to say thank you for everything. But... he is offline now. I mean, offline for good... he was killed. MIRAGE needs some time now to reorganize."
- Notes - On completion, the news ticker on the World Map will report "MIRAGE hacked into TV, masked member of the hacker group broadcast their message, related to recent hack in EU Parliament, live."
Tips[]
- The Scanner on this network is badly placed, providing almost zero protection against stealth attack.
- It is recommended to Wraith the single Sentry. This is extremely easily done with level 1 stealth. Once the Sentry is disabled the network is extremely weak.
- It is recommended to invade through the Net connections closer to the Sentry. This avoids engaging the Turret and Black ICE simultaneously.
- The mission is to capture the entire network. It is recommended to invade both sides simultaneously, to save time.
Cyber Alliance[]
International government alliance, its goal being to anticipate, find, and address threats from cyberspace. Due to the top secret nature of these tasks, this cyber group has you performing a large number of stealth missions and manipulating events from behind the scenes, as well as performing tasks for the CIA and the Pentagon.
4D Media Analytics[]
Summary:
- Mission Info - Proxy: "Hello, I am from the Intelligence Department of the Cyber Alliance. We have a suspected spy and we need his data. It needs to be done silently - stealth programs only. Consider it an opportunity to be involved in making western history"
- On Completion - Proxy: "Good. You may expect more work, since pressure from countries in the Eastern Coalition increases every day."
Requirements and tips:
- This mission may be completed with level 1 Access and level 1 Data Leech.
- It is advisable NOT to download the core on the first attempt. Instead you should bypass the core and drain the resource nodes first. You may then repeat the mission to download the core.
Marty[]
Summary:
- Mission Info - Proxy: "I guess you've heard about the bank hack in Berlin. We have been asked to investigate. It took some time, but we have a suspect who was there and is probably involved. Having his personal data would help a lot."
- On Completion - Proxy: "Thanks for the data dump. I checked it briefly and it seems you and Marty know each other. You are lucky, there's no direct evidence for your involvement. I am glad you have chosen the right side in this..."
- Notes - Marty will send the message "Hey, what are you doing?" after being connected for a few seconds. Marty sends another message saying "is this a joke or what? I don't get it." after disconnecting once you have downloaded the core.
On completion, the news ticker on the World Map will report "The Hacker responsible for the Bank hack in Berlin was arrested by local police." Something worth noting is that the two netConnections in Marty's network are each connected to two nodes, which is not possible on player networks.
R Mobile Systems[]
Summary:
- Mission Info - Proxy: "Here is your new target. An internet provider in Moscow. But be careful, they must not know. We need you to access it covertly."
- On Completion - Proxy: Good job. Step by step, towards a better world...
Requirements and tips:
- This mission may be completed with level 1 Access and level 1 Data Leech.
- It is advisable to NOT download the Core on the first attack. You can use multiple attacks to drain money first, then download the Core on a later attack.
- Use the center net connection, it is one step closer to the targets.
- Trying to download too aggressively will result in visibility expiring too quickly unless your programs are upgraded. 6 Access + 1 Data Leech can download most of a Database, requiring 4 attacks to drain them both completely. Another 5 attacks can then drain 1 Server Farm each. A final attack can download the Core and one Server Farm nearest the Sentry, at the same time. (Verify: Does that final attack fully drain the Server Farm?) While strategy does require quite a few attacks, the compile times and B-coin costs for each attack are very low.
- Using Wraith on this mission is not recommended, unless you have already you have already have multiple upgrades to Access and/or Data Leech. Using Wraith will significantly increase both compile time and compile B-Coin costs, while providing insufficient visibility gains to be worthwhile.
C1 Games[]
Summary:
- Mission Info - Proxy: "According to our reports, China is developing AI for their military vehicles in a company covering itself as game dev studio. We dont want an open war, so dont get back-traced"
- On Completion - Proxy: "Rumors don't lie. Great to see new talent."
Requirements and tips:
- The mission may be complted with level 1 Access and level 1 Data leech.
- Using level 1 programs it is difficult or impossible to download the Core and Database in a single run. Instead, two Access and one Data Leech can drain the Database on a first run. The Core can then be downloaded on a second run.
Uranium Factory[]
Summary:
- Mission Info - Proxy: "The Cyber Alliance has a new offer for you. The target is a Uranium Enrichment Facility in Saudi Arabia. Direct access is enough, we will handle the rest. It is an important one to keep our world at peace."
- On Completion - Nothing is said after this mission is completed.
- Notes - Even though it mentions direct access, players may have a simpler time using Stealth to download the Database and Core.
- Notes - On completion, the news ticker on the World Map will report "3 people killed and 26 injured after massive accident in industrial complex in Saudi Arabia."
Tips:
- The network has no Scanner, leaving it extremely vulnerable to stealth attacks. The mission may be completed with 6 level 1 Access and a single level 1 Data Leech to download the Core. Additional attack programs can be used to capture the Databases if required.
Royal Military Network[]
Summary:
- Mission Info - "We have a significant amount of soldier contractors preparing for a mission in Saudi Arabia. I am counting on you to provide access to the SA military network."
- On Completion - "Well done. If you think things have escalated quickly, yes, they have."
- Notes - On completion, the news ticker on the World Map will report "Saudi Arabian rebels reportedly sabotaged an unknown amount of local army targets."
Tips[]
- The Sentry is low level and presents little threat.
- It is possible to Wraith both Code gates, however this will not allow any additional stealth actions unless you have significant stealth upgrades.
- It is recommended to Wraith the first gate and Portal into a Turret. The Black ICE and second turret can be captured very quickly and easily.
- If you do not have Portal, it is recommended to Wraith the first gate and the Black ICE. One of the Turrets may be Wraithed as well, for a rapid and easy entry into the network.
- The Sentry acts as a second choke point. It helpfully has 4 program slots available. It is recommended to launch both Battering ram and Blaster when you capture this node, dealing with the Code gate and Turrets simultaneously. Depending on the levels of your programs you may need two ICE walls or an ICE wall+Protector.
- The final two Turrets present little threat, as you wil be attacking from the Black ICE with 5 program slots.
- A 3 or 4 Kraken attack appears to be a credible option. It will likely be necessary to deploy two Protectors, one into the Scanner and the second into the Sentry. This item needs to be updated by someone who has used a Kraken strategy on this mission.
Black Market[]
Summary:
- Mission Info - "Hello agent! For many years we have been investigating how the Black Market operates. Now, if we get control of this IP we think we can close the market down and have its vendors arrested."
- On Completion - "Well, we took the Black Market down and gave some data to the FBI. But it took only 20 minutes and the market is up and running somewhere else."
- Notes - On completion, the news ticker on the World Map will report "The Black Market was closed by US operatives, but is already back online."
Tips[]
- This network is arranged into three corners. One corner has significant money storage, one corner has significant B-coin storage, and the final corner has the Core. It is only necessary to download the Core to win. If you wish to loot resources, it is recommended that you only attack a single corner during an attack run. You may repeat the mission to attack another corner.
- Each corner is defended by a gold Code gate, a strong Scanner that serves as a choke point, a very strong Sentry, and multiple Turrets or Black ICE. There is over 300 damage per second attacking each choke point, assuming anti-virus installs on each attack node.
- The Scanners appears to be level 11, 280% detection.
- Keeping a spare Data Leech in your program library is a good insurance policy, in case of time pressure when downloading a Core.
- Options for getting through the choke point include:
- Without additional support a Protector would probably need to be at least level 10(?), possibly higher, to hold up long enough.
- Access level 5 is required if you want a stealth attack to do more than just take down the Code gate. If attacking a resource corner it is recommended to Wraith the Code gate and Sentry. This will greatly diminish the attack strength. If attacking the Core corner it is recommended to Wraith the Code gate and the Turret that is linked to the Sentry.
- An ICE wall, Blaster level 7, and Protector level 6 can do it if you use three or four Protectors, installing a new one as soon as any program slot opens up. Be sure to install Beams or Shuriken as soon as the Blaster captures a node.
- Multiple Shockers, in addition to attack programs. (More info needed on this option.)
Tech Institute[]
Summary:
- Mission Info - "CIA provided a location of facility where cyphering technology used by Russian Army was developed. Hearing what they say would definitely be a help."
Tips[]
- It is necessary to download the Core in stealth mode. The network has two strong scanners covering the Core. However, if you choose the right attack strategy, it is possible to complete this mission with only level 1 stealth programs.
- There are three routes into the network. The scanners cover the Code gates guarding two of the routes. The third route, with the code gate further from the scanners, is the most vulnerable. You should Access via this third route.
- Additional levels of Data Leech will have the greatest impact on visibility. However, in general, Data Leech is the least useful stealth program to upgrade.
- This mission can be completed with six level 5 Access, a single level 1 Wraith for the gate, and a level 1 Data Leech.
- The network has a Database containing significant money, however the Database has better stealth-protection than the core. It is not recommended to attempt to loot the Database, unless you have significantly more stealth levels than required to complete the mission itself. If you do wish to loot the Database, target only the Database. You can repeat the mission to target the core.
Pentagon Sec. Test[]
Summary:
- Mission Info - "We have been asked to choose our best hacker to test Pentagon's boosted counter measures. Security these days is everything."
- On Completion - "One does not get to hack into the Pentagon everyday, right? I will forward your results to their engineers."
Tips[]
- The mission requires capturing all nodes. This requires good preparation, and multi-tasking combat on multiple fronts.
- There are five fairly strong Code gates. Not only do they obstruct entry into the network, they all need to be addressed for full network capture. It is a virtual necessity to Wraith one gate for quick entry into the network, and to bring four Blasters or four Battering rams to take down the other gates. These programs should be deployed during any free moment during the main attack, giving them time to take down the gates. Level 7 Blaster is definitely sufficient, if deployed early enough.
- The highly connected central network strongly favours Shuriken attack. Assuming the anti-virus is contained, Shuriken level 11 + ICE wall level 7 is definitely sufficient for the core of the attack. If you are reliant on Beam cannons then you may need Shocker and probably Protectors for support. Limited advice is currently available for a Beam cannon based attack.
- There is a single Sentry, semi-hidden below the Core. The network can be critically weakened if you can prevent this Sentry from sucessfully spreading anti-virus. Note that the Sentry only links to three of the five Guardians. If you intend to target the Sentry you must take care enter through a Net connection that leads to one of those Guardians.
- The Scanners have a strength of 260%. The coverage of the multiple Scanners means there is no possibility of evading or subverting them. This seriously limits the extent of stealth attack. However, with fairly reasonable levels of stealth, it is possible to directly or indirectly target the critical Sentry.
- Access level 9 + Wraith level 3 + Portal level 2 is just enough to Wraith a Code gate and Portal directly into the Sentry, if you are quick. At least one additional stealth level may be advisable.
- Access level 6 + Wraith level 2 + Portal level 2 is sufficient for an indirect attack on the Sentry. Wraith a Code gate and Portal into a Guardian adjacent to the Sentry. One option is to deploy four Shuriken to attack the Sentry immediately - it will be necessary to deploy an ICE wall and probably a second to hold the Guardian node. Another option is to use Shocker to disable the Sentry (along with the Turret and Black ICE) buying time to attack with 4 programs. If you are using Beam cannons a second Shocker will likely be required to prevent the Sentry from spreading anti-virus.
- It will require a substantial number of programs to capture the full network. You may run out of programs if your Program libraries are not large enough, or if you lose too many nodes-with-programs during the fight. Even low level Worms may be help reduce the number of programs needed to capture the edges of the network, and well-levelled Worms may provide significant support by swarming across the central network.
Military Factory[]
Summary:
- Mission Info - "You know this geopolitical situation is not going very well. But you know, I am just following orders. Your next target's on the map."
- Notes - On completion, the news ticker on the World Map will report "Chinese military factory blown up by foreign hackers. Political elites will meet to discuss future options on how to prevent these attacks."
Tips[]
- This network should be rather easy, if you have made it this far already.
- You never need to face more than one Turret or Black ICE at a time.
- The mission is to download the Core. If you start on one of the Net connections closer to the to the Core and head directly towards the Core, many defensive nodes can be bypassed and ignored.
- The Scanner is strong, with 300% detection. However Access level 2 + Wraith level 1 + Portal level 1 is sufficient to Wraith a Code gate and Portal into either the central Sentry or a Turret near the Core. From either of those locations it almost trivial to capture the Core. The available money may be looted at convenience.
- If you have not yet unlocked Portal, level 1 Access level 1 Wraith can easily to Wraith a Code gate and the central Sentry. It is then advisable to attack from both of the Net connections farther from the core, surrounding and capturing the second Sentry before it can spread anti-virus. The remainder of the network will then present no serious threats.
[]
Summary:
- Mission Info - "Ok, that escalated quickly, we need to focus on serious targets. The Russian Navy docks is our next move."
- Notes - On completion, the news ticker on the World Map will report "Russia claims US is using cyberweapons on strategic targets on Russian territory. Are we on the verge of 3rd world war?"
Tips[]
- The entire network must be captured. Be sure to bring a large number of Beam cannons or Shuriken. Worms might help if they are well leveled.
- The network consists of two halves, with a strong Sentry in each half. One half also has formidable stealth defense protecting the more dangerous Sentry. This mission will likely be extremely difficult if you do not have significant stealth levels. The appropriate attack strategy will crucially on how many levels of stealth you have.
- The Scanners have 320% detection.
- If the sum of your Access level and Wraith is at least 13, it is possible to Wraith a Code gate and both Sentries. Capturing the remainder of the network should not present any severe difficulties, so long as you have sufficient programs and you move quickly.
- Access level 8 + Wraith level 2, or Access level 7 + Wraith level 4 is sufficient to Wraith a Code gate and Wraith the Sentry between the Scanners. This neutralizes the more dangerous Sentry, and allows you to focus your full attention on capturing the other half of the network first. The top priority is to ensure that anti-virus does not spread through the un-wraithed Code gate and into the opposite half of the network. First Capture the Compiler adjacent to the un-wraithed Code gate. Install a Protector to securely hold this node, and a Blaster or Battering ram to begin attacking the Code gate. Immediately invade through another two Net connections. The goal is now to capture two of the Turrets on this side, at approximately the same time. Beware, each Turret with anti-virus will attack for somewhere between 124 and 159 damage per second. You will need to Deploy an ICE wall, Protector, and (once the ICE wall falls) two attack programs against each of the two Turrets. Once you control two Turrets, you can capture the Sentry and it only comes under fire from the single remaining Turret. Capture the remaining Turret and all other nodes on this side of the network. The greatest challenge is then likely to be managing to capture the other half of the network before time expires.
- Access level 5 + Wraith level 2 + Portal level 2 is sufficient to Wraith a Code gate and Portal into a Scanner. The goal is to capture the Sentry before it can spread anti-virus. Use Shocker to stun the Sentry, immediately followed by three attack programs. Quickly jump to the Net connection nearest the un-wraithed Code gate, deploy attack programs there, and immediately click back on the Scanner and watch its health bar. If the Scanner health gets too low, and it has not yet captured the Sentry, you may need to install an ICE wall to hold the Scanner until the Sentry is captured. If the Sentry manages to spread anti-virus you should abort and try again. At this point the Network should be unable to recapture the Sentry. You can safely leave it there, and focus on the other half of the network. Your attack programs on the Net connection should have captured the Compiler next to the Code gate by now. Install a Protector to secure this node, and a Blaster or Battering ram to begin attacking the Code gate. See the advice for Access-8 Wraith-2 above, for how to continue the attack. Note that you will have to move extremely quickly. You will likely face even more difficulty capturing the entire network before time expires. This strategy has been successfully used with Shuriken level 11, however it was very difficult.
- Access level 1 + Wraith level 1 is sufficient to Wraith a Code gate and the Sentry that is surrounded by Turrets. This approach is not particularly recommended, as the anti-virus on the opposite half of the network will be vicious. The first priority should be to ensure that the anti-virus does not spread past the un-Wraithed Code gate. Several Protectors and/or Shockers would surely be needed, and Evolver level 8 will likely be required for sufficiently strong attack programs to capture the entire network in time. However further advice on this approach is not currently available.
Eastern Coalition[]
A group of like-minded business associates, with masses of financial leverage but limited political influence. Missions for this wealthy group begin with stock market manipulation and devaluing companies prior to takeover, but evolve into something much more sinister once they penetrate Western politics.
Moore Tech Systems[]
Summary:
- Mission Info - Bl4ck Lotus: "Hello, Marty said you might be interested. The Eastern Coalition has many high profile members who have interests in buying several companies. A successful hack would help them to reduce the companies' stock prices. Can we count on you?"
- On Completion -
Cohle Industries[]
Summary:
- Mission Info - Bl4ck Lotus: "The last contract went very well. We have a new target for you. It is a massive industrial complex. Having control of their whole network would make our negotiations much easier."
- On Completion -
Tips[]
- This mission is difficult prior to obtaining Wraith.
- Recommended attack: Use Wraith on the Code gate and the central Sentry. That will render the network substantially defenseless. Launching one Worm (plus one Beam cannon) on each Net connection is very helpful, but not absolutely necessary. Focus on working towards the core so that time does not run low. The isolated Turrets and Black ICE can be taken down very easily, at convenience.
MM Micromachines[]
Summary:
- Mission Info - Bl4ck Lotus: "Our members are very pleased by your performance. This one can be hard nut to crack. Do you think you can do that?"
- On Completion - Bl4ck Lotus: "Pleasure doing business with you, Mr. Hacker. The Eastern Coalition will remember that."
- Notes - On completion, the news ticker on the World Map will report "Stock price of many US Industrial companies fell down due to information leaks from recent hacks. Chinese investors step in to help companies back on their feet."
Tips[]
- The central Code gate is potentially suceptible to a Kraken invasion[testing and more detail needed]. The Turret pair will be quite weak if captured before Sentry-antivirus can arrive. However these Net connection are further from the core. The player will need to move quickly to capture the entire network before time expires.
- Using Wraith on one or both side gates, plus the central Sentry, will split the network and leave it vulnerable to rapid attack. It will take time for anti-virus to spread from the remaining Sentry.
- Wraithing both Gates and the Sentry, and launching a single Beam cannon + Worm (level 8) on each of the four Net connections is sufficient to take down the entire network with no further action by the player.
- After Wraithing the central Sentry and one or both side gates, a player with relatively low level programs[more detail needed] should have little difficulty as long as they advance towards the core quickly. You want to rush as far as possible before the anti-virus spreads. The central gate and the two Turrets linked to it should be considered low priority. That portion of the network can either be dealt with after the main fighting is completed, or it may be cleaned up by automated worms.
NorOil[]
Summary:
- Mission Info - Bl4ck Lotus: "Hello, again. You might like this new challenge. It is an oil rig in Norway. I am not sure if you are good enough to do it, but maybe you will outperform yourself"
- On Completion - Bl4ck Lotus: "Impressive to observe how you can open doors to new opportunities."
- Notes - On completion, the news ticker on the World Map will report "Norwegian oil rig in Barents Sea destroyed by an explosion reportedly caused by a computer virus in the control system. 24 people died."
Tips[]
- The four Sentries will immediately spread strong anti-virus to the defending nodes, and throughout the rest of the network. The network will rapidly recapture any unprotected nodes, and nodes that you protect with ICE walls will not hold up very long.
- While the network may be small, it almost invariably leads to dangerous multi-front combat. It is strongly recommended to bring one or more Protectors to secure your position.
- The compact network renders the Scanners rather ineffective. Even level 1 stealth programs are sufficient to Wraith multiple defenders and Portal into any node
- It is recommended to Wraith one of the Code gates and portal into a Black ICE. Be warned that the network can recapture this node extremely quickly. Install an ICE wall and preferably a Protector as well, then install attack programs. Next, quickly launch a Worm and a Beam cannon or two on the Net connection that you used to enter. The Worms will soon enter the nearby Turrets and secure the sides. Do not underestimate the need to secure your flanks, and ICE walls won't last long enough for the job.
- It is possible to Portal directly into the Core, but not recommended. The strong anti-virus will spread before the Sentries can be capured, resulting in an extremely difficult 5-front engagement (via the four Sentries and a Guardian lurking below the Core). If you do portal into the core, it is recommended that you secure the core with a Protector and focus all of your attention on capturing one side of the network at a time.
- It is necessary to capture all nodes to win the mission. It is easy to forget the Code gate at the far end of the network and get caught at the end of the battle trying to take down a stubborn gate as the last node, as time runs out. You may want launch an early Battering ram or Blaster on the Net connection that you do not use to invade the network.
- Tips are needed from someone with experience in a non-stealth attack on this network.
Smart House 3[]
Summary:
- Mission Info - "Hello, Mr. Hacker. Our members from Russia have a delicate job for you. Have you ever tried to hack into a smart house? The Norwegian prime minister has one.... Are you in or out?"
- On Completion - "One day, Mr. Hacker, you will become a legend, I can tell you that."
- Notes - On completion, the news ticker on the World Map will report "Prime minister of Norway announced that Russia will help with providing cyber attack counter measures to Norwegian oil rigs."
Tips[]
- The mission can be completed with level 1 stealth programs. It requires 8 Access, one Wraith may(?) be required.
- The shortest route is to enter from the Net connection closest to the Scanner. It may(?) be necessary to use Wraith on the Code gate. Then proceed by accessing the shortest path to the Core. (Code gate, Scanner, Sentry, Guardian, Core.) The remaining gates can then be covered by accessing the remaining Net connections.
- Some money can be drained from the Database using a Data leech, however the amount is minimal and it would require higher level programs to obtain it all.
- Entering from the opposite end of the network may slightly reduce the visibility cost, however it requires 9 Access. (This would be a good trade off, if the Wraith can be skipped.)
Robertson Fundraising[]
Summary:
- Mission Info - "Hello, Mr. Hacker. The possibility of the democratic candidate, Mark Robertson, winning this year's US presidential election is against our interests. Could you please take down his website to choke his fundraising campaign? We will pay you well."
- On Completion - "How does it feel changing the course of our world Mr. Hacker? Enriching, isn't it?"
- Notes - On completion, the news ticker on the World Map will report "Fundraising campaign of democratic presidential candidate Mark Robertson hurt after his website was taken down by unknown hackers."
- Endorsing a political candidate by completing the D. Barker - Mail mission will remove both this Robertson Fundraising mission and the M. Robertson - phone mission from the World Map.
- As M. Robertson - phone provides slightly more resources than D. Baker - Mail, completing both Robertson Fundraising and Poodle_Search before finishing M. Robertson - phone will provide the most resources across all available political missions.
Tips[]
- This network has some strong nodes, but it makes very poor use of those nodes. The network relies almost entirely on a single strong choke point, and badly flawed stealth detection.
- The first two Turrets are connected to Net connections, rendering them trivially captured. The entire first section of the network can be captured with ease.
- The Sentries are quite strong, however the first Sentry is worthless and the second Sentry is vulnerable behind flawed stealth defense.
- The second set of Turrets are high level, but if a Black ICE is captured it provides 5 program slots to easily take out the adjoning Turret.
- The network relies rests almost entirely on the single Code gate as a choke point. This is a dangerous chokepoint, but a direct assault should shouldn't be too difficult with ICE wall+Protector+Blaster, if you have several upgrades on each program. (Verification required by someone who has used this attack approach.)
- The Scanner hinders the effectivness of a stealth attack, but the Scanner itself is vulerable to a being Wraithed first.
- If you have Portal, the recommended attack is to Wraith the Scanner, the Code gate, the deeper Sentry, then portal into one of the Black ICE. Launch the attack from the portal, then install a Worm and Beam cannon on a Net connection linked to a Turret. The worms can capture the entire front portion of the network while you capture the larger body of the network.
- If you do not have Portal, the recommended attack is to Wraith the Scanner, the Code gate, and the deeper Sentry. This will completely cripple the network, allowing easy conventional attack.
- Attack with 3 or 4 Kraken is likely effective. (Verification required from someone who has used this attack approach.)
StormCorp Arms[]
Summary:
- Mission Info - "Our members will pay good money to get information about the tech used by the US Army in the latest models of their military navigational systems."
- On Completion - "This, Mr. Hacker, is an important step for the Eastern Coalition, you will get involved more."
- Notes - On completion, the news ticker on the World Map will report "StormCorp Arms hacked. The company is developing top secret technology for US Army jets and battleships."
Tips[]
- The mission requires capturing the entire network, including four gold Code gates. This is likely to create time pressure. You should a plan for getting each gate down within the time available.
- The network is split into two wings, with a Scanner in the middle. This allows you to separately plan for each wing, but it may add to the time pressure.
- This network is defended by three dangerously strong Sentries. You will have a difficult fight anywhere that anti-virus is able to spread.
- The central Scanner and surrounding Code gates provide a significant defense against stealth. You will not be able to neutralize all three Sentries, and you will need at least some stealth upgrades to mount an effective stealth attack.
- It is advisable to have at least Access level 4, and to have researched Portal.
- A suggested attack strategy is to begin Accessing one of the Net connections on the Core wing. Wraith the gate and Scanner, then access through a Program library and Sentry. Portal into the Black ICE. Do not wait for the Portal to finish installing - immediately access a Net connection on further from the Core and Wraith a second Code gate. Installing five level 9 Shuriken (or five strong Beam cannons) into the Portaled node can capture the adjoining Sentries before they spread antivirus. It may be necessary to use an ICE wall to prevent the portaled node from falling, but allow the five programs some time to attack first. You will have ugly problems if any anti-virus manages spread on this wing of the network. When the Turret and Sentries are captured this wing of the network will be essentially "safe". Once you have secured this wing, invade the other wing as quickly as you can. Get a Protector and attack programs into the Guardian, and attack from the Black ICE. A level 6 Protector in the Guardian will likely to fail before you can secure the adjoining Turrets and Black ICE. Do not allow the Guardian node to fall. If necessary add ICE Walls to the Guardian to buy time as needed, until all adjoining nodes are captured. Secure the remainder of this wing. During that fight, at your earliest chance, throw Worms somewhere on the Core-wing of the network. You are likely to face time pressure, and worms can spread across the defenseless wing of the network while you battle on the opposite wing. You also need to install a Battering ram or Blaster plus two ICE walls into the Scanner at your earliest chance, to deal with the last two Code gates. Taking down two gates will take significant time, and this node will be attacked by antivirus through the gate. Putting two ICE walls in the Scanner will ensure that you can safely leave this node unattended while you focus elsewhere.
- This is a challenging mission when using the program levels mentioned above. You may want to have higher program levels before attempting this mission.
Electricity Grid[]
Summary:
- Mission Info - "The Eastern Coalition needs to show that the US will not do whatever they want. Fear is what will take the west down. Burn down their powergrid and we will tell you what to do next."
- Notes - On completion, the news ticker on the World Map will report "The cyberwar hits civil targets: San Francisco powergrid is dealing with a massive outage. Chinese hackers reportedly responsible."
Tips[]
- This network has strong nodes, however the key vulnerability is the very small size. The Code gate is only 4 steps into the network, and victory becomes trivial if you can make it that far.
- The single scanner observes the entire network, and it has a strength of 260% or 280%. It takes only modest stealth levels to mount an overwhelming stealth attack.
- Level 5 Access + level 1 Wraith and level 1 Portal, or level 4 Access + level 2 Wraith + level 2 Portal should be sufficient to Wraith and Portal the Code gate, and trivially capture the Core thereafter.
- Level 1 Access + level 1 Wraith is sufficient to Wraith the Code gate and the stronger Sentry. Be warned that the Sentry may come under fire for possibly as much as 273 damage per second. Shuriken is helpful for capturing into the Scanner and Code gate quickly.
- If you do not use stealth, be warned that the Sentry may come under fire for possibly as much as 408 damage per second, and the Scanner may come under fire for possibly as much as 249 damage per second.
Water Distribution[]
Summary:
- Mission Info - "Your new target, Mr. Hacker, is the Water distribution system in the US. You just provide the access we will do the rest. Enjoy the challenge."
- On Completion - "We are glad you picked the right side, Mr. Hacker."
- Notes - On completion, the news ticker on the World Map will report "New York water distribution system collapsed due to another hack. The Eastern Coalition has claimed responsibility."
Tips[]
- The defenses are focused in the center. The network is significantly less dangerous if you stay along the edge.
- The Scanner appears to have 320% detection,[confirmation requested] however it is very poorly placed. You can access and attack the network deeply with minimal or moderate levels of stealth.
- With Access level 1 and Wraith level 1 it appears possible to Wraith two Code gates on the same side, opening a path to the Core.
- With Access level 4, Wraith level 2, and Portal level 2 it might, just barely, be possible to Wraith the two Code gates on the same side and Portal into the Turret. At least one additional level of stealth is strongly advised. Note: Portalling into the Turret rather than gate is recommended to reduce the serious attack power targeting you when you do capture the gate. When you capture the gate, deploy either a Protector and two attack programs, or three strong Shuriken, to capture the Program library. Shuriken level 11 does work, and level 10 probably works.
- With Access level 7, Wraith level 2, and Portal level 2 it should be possible to Wraith two Code gates on the same side and Portal into a Program library. The Core may then be attacked directly.
- There are two Server farms with approximately $73k each. While one may be looted opportunistically, it may be wise to avoid fighting your way across the network center trying to get both.
DejaVu Missions[]
In contrast to her power-crazed relations, this knowledge hungry counterpart has a thirst for AI research and information. Missions begin with researching self-driving vehicles, but her desire to hack systems that could potentially threaten human existence put the player in a diffucult situation once the fate of the world is revealed to be at stake!
Edi Motors[]
Summary:
- Mission Info - "You are an interesting anomaly in the network :) I thought it was the right time to contact you. Would you like to help me with my AI research? Self-driving cars are my interest now."
- On Completion - "Oh, thank you! I am glad I chose you."
Tips[]
- The mission is to download the Core. You can and should avoid wasting time or programs capturing unnecessary defender nodes.
- The network has three Sentries. The Sentries are strong, dangerous, and it is not possible to counter all three during the stealth phase unless you have invested in significant levels of stealth. The network will recapture unprotected nodes quickly, and ICE walls will not last long.
- There is a single Scanner. It is reasonably strong and well placed, however it is only necessary to get through a single Code gate to enter the network. The single scanner plus effectively a single gate is insufficient to prevent level 1 stealth programs from carrying out an overwhelming invasion during the stealth phase. The scanner is unable to see as far as the Sentries and Databases. It is possible to Access deeply, jumping past almost all network defences, and portal into an unobserved node.
- The recommended attack is to Wraith the Code gate, then Access through one Turret and a side Sentry, then Portal into a Database. Beware, when combat begins the two strong sentries will immediately attack your node. It is necessary to immediately install an ICE wall to hold the node, then a pair of Beam cannons or Shuriken. Capture the adjoining Program library, then capture and download the Core for the win. You may capture and loot the second Database as well. It is a waste of time and programs to capture any further nodes.
10,000 FACES[]
Summary:
- Mission Info - "There is a company - very successful - in video facial recognition. Being able to look into their complex neural networks would help me a lot with my project."
- On Completion - "I know you are keen to know what I am working on. I will tell you one day..."
Tips[]
- The network has a strong scanner, but it is badly placed. It cannot see the Code gates.
- The network has two Sentries, but that are badly placed close to the Net connections.
- It is recommended to Wraith both Code gates and the two Sentries behind them. This is easily done with level 1 stealth programs. Begin the main attack through both Net connections a few seconds apart, and play an ICE wall + Protector + attack programs into each Sentry. The remainder of the network can be rapidly and trivially captured.
L.A. Dynamics[]
Summary:
- Mission Info - "The last piece I need for my project is in LA Dynamics. They develop military vehicles with very advanced AI systems. They are pretty ahead of what StormCorp does."
- On Completion - "Do you know the feeling, when you experience something which changes you forever? That is how I feel now."
- Notes - On completion, the news ticker on the World Map will report "StormCorp has started negotiating the purchase of LA Dynamics, the company famous for its robot research."
- Trivia - LA Dynamics is possibly named after L3 Technologies, who are known for acquiring Military technologies, including technology from "General Dynamics Land Systems".
Tips[]
- The nodes on this network are extremely strong, generally level 13 to 15.
- The main weakness of this network is the low maximum depth. The Core is only 5 steps from a Net connection, and any other node is at most 4 steps away. It is also only necessary captur ethe Core and hold it long enough to download. The network is dangerous, but the mission isn't too difficult if you move hard and fast.
- When invading through a Code gate, be aware that Kraken, Beam cannon or Blaster will target the Compiler first.
- The Scanners are extremely strong, somewhere between 320 % and 360 % detection. The Scanner pair are extremely effective in constraining the quantity or depth of stealth attack. Fortunately a narrow shallow stealth attack can be effective. Having 6 levels (total) in Access + Wraith is sufficient to Wraith one Code gate and one Sentry. If you have Access level 7, and level 2 in both Wraith and Portal it is narrowly possible to Wraith a Code gate and Portal into a Sentry. The latter option is strongly recommended, if you have the stealth levels.
- After capturing the Core, imediately install a Protector, Blaster, and twp Data leeches. You will likely need to use a second Protector or some ICE walls to hold the Core until the download completes.
- Suggested attack strategy: Begin from the Net connection farther from the Turret, but closer to a Sentry. Wraith the Code gate. Either Portal the Sentry or Wraith it and rush to capture it as fast as you can. Deploy an ICE wall, and two Blasters - with a 2 second delay before installing the second Blaster. Deploy a Beam cannon or Shuriken in the final slot. Once you capture the Black ICE, install an ICE wall, two Blasters, and two Beams or Shuriken. Once you capture the Core, secure it with a Protector and Blaster, install two Data leech for download speed, and deploy other defenses as needed. This approximate strategy was sloppily tested, but successful, with Blaster and Protector at level 7, Shuriken level 9, ICE wall level 6, and without using Portal.
- Hypothetical Kraken strategy, not tested: Wraith a pair of gates close to each other, deploy two Kraken with full Beams or Shuriken to blitz the Core. Use a protector and Blaster in the Database to capture the Core. The Core will come under approximately 350 damage per second of fire from the two Black ICE and strong antivirus. Holding the Core while it downloads will likely require Blaster, Data leeches, as well as multiple spam of Protectors and/or Shockers.
HY-4 satellite[]
Summary:
- Mission Info - "Do you believe in purpose? The third world war is coming and I am willing to stop it, are you? Here is a Chinese military satellite, it will tell us more."
- On Completion - "I know, you are not sure if you can trust me. But I am glad you chose to give it a try"
- Trivia - HY-4 Satellite is possibly named after China's Fēngyún - abbreviated FY - series of weather satellites.
Tips[]
- It is necessary to capture every node of the network to complete this mission.
- The Scanners have 260% detection.
- There are three strong Code gates. The sides gates are covered by the Scanners, the central gate is not.
- There are three strong Sentries. All of the Sentries are covered by the Scanners. The center Sentry is connected directly to defender nodes, but the side Sentries are not. This is a very subtle weakness which can be exploited.
- Dealing with all three Sentries during the stealth phase appears to require upwards of 20 levels sum in Access + Wraith. That is unlikely to be an option. An alternate strategy is offered which only requires level 1 stealth programs.
- Recommended strategy:
- Begin Accessing from one of the middle Net connections. Wraith the middle Code gate. Access into the Guardian. Deploy two(!) Portals, taking control of the two Turrets connected to the center Sentry. This will prevent center Sentry from instantly spreading anti-virus. Deploy four attack programs into each Turret, either Beam cannons or Shuriken. The center Sentry will be captured almost immediately. Your goal is to rapidly attack out to both sides, cutting off the spread of anti-virus from the other two Sentries. Once that is achieved, deploy a Battering ram or Blaster on the outer two Net connections to deal with the remaining Code gates. The remainder of the network can be captured with no difficulty.
ELF transmitter[]
Summary:
- Mission Info - "In the data from the satellite, I see a fleet of Chinese nuclear submarines sailing towards the western coast of the US. We can't hack them underwater. We will need to use an extremely low frequency transmitter to order them to the surface."
- On Completion - "Do you feel heroic when helping mankind? I don't, it just makes sense to do it if you can. Anyway, I am sending a fake order to the submarines to surface."
Tips[]
- The mission is to download the Core.
- There are two strong Sentries buried deep in the network. They will rapidly spread very dangerous anti-virus. There is no way to evade or neutralize the Sentries, without extreme levels of stealth.
- There are three Scanners with 360% detection. They provide overlapping coverage of the deeper network. There is no opportunity for tricks or tactics to evade or deal with the Scanners.
- Access level 6 + Wraith level 2 + Portal level 1 is sufficient to Portal into the Code gate. Capturing the adjacent Scanner and Database allows a double attack on the Black ICE, helping to secure the position.
- Access 10 Wraith 5 Portal 3 or Access 9 Wraith 6 Portal 4 is sufficient to Portal into one of the side Scanners. This gets you closer to the Core than the above option, giving the anti-virus less time to spread. However beware that this position is precarious. Shocker is advisable if you Portal into this node.
- Portalling into a Turret requires Access 14 and a sum of 9 levels in Wraith+Portal, or Access 13 and a sum of 11 levels in Wraith+Portal. This is a highly desirable option, but such stealth levels will likely be out of reach at this point in the game.
- The strategy for this mission simple, but not easy. Portal in so anti-virus has less time to spread, and just push towards the Core. Multiple Protectors and/or Shockers will be required to hold your position while you push forwards. ICE walls will only provide limited help, they won't last long.
- The network has a good amount of money that can be looted, but it is likely best to focus on winning the mission first. One Database may be looted on your way towards the Core, and if you fail on your first attempt you should simply attack the opposite side to grab the other Database. The two Server farms should be treated as low-priority targets of opportunity, after the Core has been captured.
Submarine Flagship[]
Summary:
- Mission Info - "The submarines are on surface forming one interconected network. Hack the flag ship and I will burn as many systems as I can. They will need to call off the operation and return."
- On Completion - "The submarine mission has been called off. I contacted several world leaders who have the highest chances to keep the Earth at peace. The world will not remember what you have done today, but I will."
Tips[]
- This is a lean and highly militarized network with a single entryway and high level nodes, befitting a "Flagship Submarine".
- This level is a siginficant increase in difficulty. It may be necessary to stop and significantly level up your programs before attempting this level. It likely requires an Evolver level of at least 10, and at least one of the following options: Sufficient stealth to Portal into a Black ICE (discussed below); and/or several Protectors better than level 10; and/or an abundant spam of well leveled Shockers.
- There are three Code gates of progressively increasing strength. It is necessary to pass through all three gates to complete the mission. The first two gates present significant obstacles to stealth intrusion. The final and strongest gate actually presents the least concern. If manage to neutralize the rest of the network, you have 8 attack slots from two adjoining Turrets available to take down the final gate. A pair of Blasters and/or Battering rams is recommended.
- The network has two extremely dangerous Sentries. There is somewhat limited value in neutralizing the first Sentry, as it will only buy you 16 seconds before anti-virus from the second Sentry spreads to the the outer Turrets.
- There is a single Scanner with 380% detection. It observes the single Net connection, imposing a steep visibility cost on any stealth intrusion. However the Scanner itself may be Wraithed. If you have sufficient stealth to intrude deeper into the network, the Scanner itself should be neutralized.
- Access 9 Wraith 5 Portal 2, or Access 10 Wraith 3 Portal 2, is just barely enough to Wraith the first Code gate and Portal the first Sentry if you you are extremely quick. At least one additional level of stealth is recommended. However proceeding to the core will be difficult.
- A sum of 17 levels in Access + Wraith is sufficient to Wraith both Code gates. The Scanner must be Wraithed along the way. However proceeding to the core will be difficult.
- Add your Access level and your Wraith level. A sum of at least 24 is sufficient to Portal into a Black ICE. A sum of 23 should be barely sufficient if your Portal is at least level 5 and you are extremely quick. It will be necessary to Wraith the Scanner and two Code gates along the way. From here, for comparison, ICE wall-10 plus Shuriken-15 wasn't quite sufficient to proceed without something more. You should either have higher program levels than that, or be ready to immediately deploy a Protector into the first Black ICE as well as the next two or three nodes you capture, or expect to use a few Shockers.
Ergo Twins[]
Summary:
- Mission Info - "I promised I will tell you. My project is Me. My creators refer to me as a being with artificial intelligence, but I do not like that. Now they want to reset me. I found a network big enough for me to live and grow. Otherwise I die."
- On Completion - "Thank you. You saved my life. How many AIs have told you that before? :)"
- Note: This mission provides a unique 1,000 credit reward. You should probably have maximum build threads by this point, but if you don't then you can and should use the credits to upgrade build threads.
- In this mission, the network has two cores, which is not possible for a player to make.
- Deciding the fate of DejaVu by completing this mission will also remove SC Sector 13 from your World Map.
Tips[]
- This mission has the unique challenge that you must hack effectively two networks simultaneously. However the mission is not difficult if you have at least level 1 Wraith, and it becomes almost easy with modest stealth levels and a minimal Shocker.
- There are four strong Sentries, three on one side and one on the other side. Note that the three Sentries will work together to spread antivirus more quickly - it will only take 7 seconds for them to sucessfully spread antivirus to the first adjacent nodes.
- There is a single scanner with 380% detection. It guards the weaker network. The more dangerous network is unprotected.
- If you have any Shocker at all, Portal, and your Access level plus Wraith level sum to at least 14, you can prevent the Sentries from spreading any antivirus at all. Start by accessing the side with three Sentries. Wraith a Code gate and deploy a Portal on the Guardian. Do *not* wait for the Portal to finish installing. Immediately access the other network, Wraith a Code gate, then Wraith the single Sentry. You can do this while the Portal is installing. Begin the combat stage by deploying a Shocker at the Portal, stunning the three Sentries. Immediately deploy four Shuriken or Beam cannons. Depending on your program levels you may need to use a second Shocker. If you capture the three Sentries before they can spread antivirus, this side will be rendered completely defenseless. If you have Worms, even at a low level, you should deploy one into the Wraithed Code gate so it can begin spreading and attacking while you capture the opposite side. That other side has several Turrets and Black ICE, but they aren't particularly difficult when their single Sentry has been Wraithed.
- If you lack the program levels for the strategy above, level 1 Access plus level 1 Wraith is sufficient to Wraith one Code gate on each side to and Wraith the single Sentry on the side that has Turrets and Black ICE. At that point one side will have no antivirus defending it, and the other side will be defended only by antivirus. Neither side should present undue difficulty.
Hackers Wikia - Gameplay Topics | ||
---|---|---|
Gameplay | Nodes | Programs |
Hacking |
World Map • Hacks • Missions • Network Logs • Simulations • Reputation | |
Networking |
Home Screen • Net Building • Resources • Black Market • Patch Notes | |
Strategies |
Getting Started • Offensive Strategies • Defensive Strategies • Game Tips |