Bulgaria  China  Taiwan  Czech  UK  France  Germany  Indonesia  Italy  Japan  Malaysia  Poland  Portugal  Romania  Russia  Spain  Turkey  Vietnam

Battering ram Ion cannon Blaster Kraken
Battering Ram Beam Cannon Blaster Kraken
Maniac Shuriken Shock Worms
Maniac Shuriken Shocker Worms

Summary Edit

Offensive programs are the basic tools of hacking. Viruses such as Beam Cannon, Worms, or a mighty Kraken have the potential to overwhelm any Security Nodes on a network by sheer force. This method of attack is referred to as "Brute Force" and differs significantly from the more subtle Stealth hacking.

  • Beam Cannons are the basic virus, focusing on a node until it is captured.
  • Shurikens are similar to Beam Cannons, but attack all connected nodes simultaneously.
  • Worms can replicate themselves, quickly spreading throughout a network.
  • Blasters are extremely powerful and stun nodes for a short time, but are slow to install and fire, and take up more space.
  • Battering Rams target Code Gate filters and Guardian shields.
  • Shockers stun connected nodes, preventing attacks and regeneration.
  • Krakens start from the netConnections and head straight for the Core, combining their strength as the tentacles meet.
  • Maniacs deliver massive kamikaze attacks, but can only be used once and take up a large amount of disk space.

Statistics Edit

Each program takes a certain amount of time to be installed on a node, during which the program is not active. However, if the node is recaptured by the network in that time, the program will be lost. Each program also takes a certain amount of disk space, which it occupies in program libraries once it is compiled. Finally, each program also takes a certain amount of time to assemble in the Compiler. Programs can be compiled instantly by using Credits.

Offensive Program Statistics
Program Install
Beam Cannon1.0 Seconds120 Seconds
Shuriken1.0 Seconds130 Seconds
Worms1.0 Seconds31 Minutes
Blaster5.0 Seconds65 Minutes
Battering Ram2.0 Seconds510 Minutes
Shocker0.5 Seconds68 Minutes
Kraken1.0 Seconds78 Minutes
Maniac0.5 Seconds1530 Minutes

Attack Priorities Edit

Different programs have different methods of attack, and may have additional, special abilities such as stunning or attacking every connected node. When an offensive program has a choice of which node to attack, it will select a target using the following criteria:

Priority list: (Updated for v.1.2 - see Patch Notes)

  1. Security Nodes with a Strength value - Sentry, Turret and Black ICE - and A.I. Nodes which have an antivirus installed. Other Security Nodes - Guardian, Scanner and Code Gate - are considered regular nodes in this regard.
  2. White A.I. Nodes which do not have an antivirus installed.
  3. The Core, regardless of antivirus status, including a Core that is upgrading.
  4. Any other Black Nodes - Nodes with an installed antivirus.
  5. Partially Black Nodes - Nodes where an antivirus is currently being uploaded.
  6. White Nodes and Upgrading Nodes - Nodes which are upgrading and Nodes where an antivirus is not present (including upgrading Security Nodes, but not including an upgrading Core).
  7. Nodes under the Wraith effect.

As of Patch v1.025, if multiple connected nodes fall under the same category, programs will prioritize nodes with the highest firewall first. If these nodes also have the same firewall value, programs will prioritize the node which the defender attached first.[1]

Trivia Edit

The Brute-Force attack was most likely named after the real life Brute-Force attack, where decoders would try many passwords or passphrases with the hope of eventually guessing correctly.

References Edit

  1. Trickster Arts Forums - Link Order after v1.025 Update
Hackers Wikia - Programs List
Programs Nodes Gameplay
Offensive Programs

Battering ram Battering Ram  Ion cannon Beam Cannon  Blaster Blaster  Kraken Kraken 
Maniac Maniac  Shock Shocker  Shuriken Shuriken  Worms Worms 

Defensive Programs

Icewall ICE Wall  Protector Protector 

Stealth Programs

Access Access  Dataleach Data Leech  Portal Portal  Wraith Wraith 

A.I. Programs

Beetle A.I. Beetle  Hawk A.I. Hawk  Squid A.I. Squid 

Community content is available under CC-BY-SA unless otherwise noted.