Hackers Wikia
Register
Advertisement


  Български - Атакуващи  简体中文 - 进攻病毒  正體中文 - 暴力程式  Čeština - Útočné  English - Offensive  Français - Offensif  Deutsch - Offensiv  Bahasa Indonesia - Program Penyerangan  Italiano - Offensivi  日本語 - 攻撃  Bahasa Malayu - Penyerang  Polski - Ofensywne  Português - Ofensivo  Română - Ofensiv  Русский - Атакующие  Español - Ofensivo(Español)  Türk - Saldırı  Tiếng Việt - Chương trình tấn công tổng lực


Battering ram Ion cannon Blaster Kraken
Battering Ram Beam Cannon Blaster Kraken
Maniac Shuriken Shock Worms
Maniac Shuriken Shocker Worms

Summary[]


Offensive programs are the basic tools of hacking. Viruses such as Beam Cannon, Worms, or a mighty Kraken have the potential to overwhelm any Security Nodes on a network by sheer force. This method of attack is referred to as "Brute Force" and differs significantly from the more subtle Stealth hacking.

  • Beam Cannons are the basic virus, focusing on a node until it is captured.
  • Shurikens are similar to Beam Cannons, but attack all connected nodes simultaneously.
  • Worms can replicate themselves, quickly spreading throughout a network.
  • Blasters are extremely powerful and stun nodes for a short time, but are slow to install and fire, and take up more space.
  • Battering Rams target Code Gate filters and Guardian shields.
  • Shockers stun connected nodes, preventing attacks and regeneration.
  • Krakens start from the netConnections and head straight for the Core, combining their strength as the tentacles meet.
  • Maniacs deliver massive kamikaze attacks, but can only be used once and take up a large amount of disk space.

Statistics[]

Each program takes a certain amount of time to be installed on a node, during which the program is not active. However, if the node is recaptured by the network in that time, the program will be lost. Each program also takes a certain amount of disk space, which it occupies in program libraries once it is compiled. Finally, each program also takes a certain amount of time to assemble in the Compiler. Programs can be compiled instantly by using Credits.

Offensive Program Statistics
Program Install
Time
Disk
Space
Compilation
Time
Beam Cannon 1.0 Seconds 1 20 Seconds
Shuriken 1.0 Seconds 1 30 Seconds
Worms 1.0 Seconds 3 1 Minutes
Blaster 5.0 Seconds 6 5 Minutes
Battering Ram 2.0 Seconds 5 10 Minutes
Shocker 0.5 Seconds 6 8 Minutes
Kraken 1.0 Seconds 7 8 Minutes
Maniac 0.5 Seconds 15 30 Minutes

Attack Priorities[]

When a Beam Cannon, Blaster, Maniac or Worm program has a choice of which node to attack, it will select a target using the following priorities:

Priority list: (Updated for v.1.2 - see Patch Notes)

  1. A.I. Nodes which have a fully installed antivirus, in addition to all Sentry, Turret and Black ICE nodes.
  2. A.I. Nodes where an antivirus is currently being installed.
  3. A.I. Nodes which do not have an antivirus installed.
  4. The Core, regardless of any antivirus or upgrading status.
  5. Any other node with a fully installed antivirus.
  6. Any other node where an antivirus is currently being installed.
  7. Any other nodes where no antivirus is present and any non-Core node which is upgrading.
  8. Any node under the Wraith effect.

Battering Rams can be used to attack active Code Gates and nodes witch have a Guardian shield effect present. When a Battering Ram has a choice of which node to attack, it will select a target using the following priorities:

Battering Ram Priority list:

  1. Code Gates with an active Guardian shield effect.
  2. Code Gates that do not have an active Guardian shield.
  3. Any other node with an active Guardian shield effect.

As of Patch v1.025, if multiple connected nodes fall under the same category, programs will prioritize nodes with the highest firewall first. If these nodes also have the same firewall value, programs will prioritize the node which the defender attached first.

Trivia[]

The Brute-Force attack was most likely named after the real life Brute-Force attack, where decoders would try many passwords or passphrases with the hope of eventually guessing correctly.

Hackers Wikia - Programs List
Programs Nodes Gameplay
Offensive Programs

Battering ram Battering Ram  Ion cannon Beam Cannon  Blaster Blaster  Kraken Kraken 
Maniac Maniac  Shock Shocker  Shuriken Shuriken  Worms Worms 

Defensive Programs

Icewall ICE Wall  Protector Protector 

Stealth Programs

Access Access  Dataleach Data Leech  Portal Portal  Wraith Wraith 

A.I. Programs

Beetle A.I. Beetle  Hawk A.I. Hawk  Squid A.I. Squid 

Advertisement