Hackers Wikia
Advertisement
Hackers Wikia


  Български - Портал(Български)  简体中文 - 传送门  正體中文 - 傳送門  Čeština - Portál  English - Portal  Français - Portail  Deutsch - Portal(Deutsch)  Bahasa Indonesia - Portal(Bahasa Indonesia)  Italiano - Portale  日本語 - ポータル  Bahasa Malayu - Portal(Bahasa Malayu)  Polski - Portal(Polskie)  Português - Portal(Português)  Română - Portal(Română)  Русский - Портал  Español - Portal(Español)  Türk - Portal(Türkçe)  Tiếng Việt - Cửa Sau



Summary[]


Make a back door connection in stealth mode with the Portal program. A node with Portal installed becomes red. You may start your brute force attack from there.

The Portal is a Stealth Program which instantly controls a node on a network, enabling you to start a Brute Force attack from that node. Once the Brute Force phase starts, the node is considered captured and will be attacked by the defending network. Similar to Wraith, the Portal deletes itself once installed.

Statistics[]

  • Notes: While the Portal is technically allowed to upgrade at the Evolver levels displayed, the Capacity of B-coins that can be held at those levels may not be sufficient to purchase the upgrade.
    More Info here: Max amount of B-coins at Core Level.
Program Stats
Program
Level
Visibility
(per second)
Compilation
Price
1 55 / Second B160
2 50 / Second B320
3 48 / Second B480
4 46 / Second B640
5 44 / Second B800
6 42 / Second B960
7 40 / Second B1,120
8 38 / Second B1,280
9 36 / Second B1,440
10 34 / Second B1,600
11 32 / Second B1,760
12 30 / Second B1,920
13 28 / Second B2,080
14 26 / Second B2,240
15 24 / Second B2,400
16 22 / Second B2,560
17 20 / Second B2,720
18 18 / Second B2,880
19 16 / Second B3,040
20 14 / Second B3,200
21 12 / Second B3,360
Research Stats
Program
Level
Upgrade
Cost
Experience
Gained
Research
Time
Required
Evolver Level
1 B16,000 500 24 Hours 6
2 B32,000 575 30 Hours 6
3 B48,000 650 36 Hours 7
4 B60,000 725 42 Hours 7
5 B80,000 800 48 Hours 8
6 B100,000 825 54 Hours 8
7 B120,000 850 60 Hours 9
8 B140,000 875 66 Hours 9
9 B160,000 900 72 Hours 9
10 B180,000 930 80 Hours 10
11 B200,000 960 88 Hours 10
12 B220,000 1,000 96 Hours 10
13 B260,000 1,080 104 Hours 11
14 B300,000 1,160 112 Hours 11
15 B340,000 1,250 120 Hours 11
16 B380,000 1,375 132 Hours 11
17 B420,000 1,500 144 Hours 12
18 B440,000 1,625 156 Hours 12
19 B460,000 1,750 168 Hours 12
20 B480,000 1,875 180 Hours 12
21 B500,000 2,000 192 Hours 12
Total B4,936,000 23,205 2,004 Hours 12


Tips[]

  • Make your way to the node you wish to Portal by using Access programs.
  • Portal can not be installed on Code Gates with an active filter. Use Wraith to disable them first.
  • Nodes with Portal installed do not count as a netConnection, therefore Kraken can not be installed there.
  • Depending on location, it is generally useful to portal on a node with plenty of program slots and high firewall, such as the Core or Black ICE, or a node with many connections to quickly advance.
  • It is generally a high risk to Portal onto a chokepoint or any node with low firewall directly connected to a security node.
  • Since a node with portal installed is considered captured, use this to your advantage by portaling on a security node - it may save you a Wraith or at least some precious time.
  • Portal can also be used to bypass an area which contains a lot of security nodes and access to the base's resources directly.
  • Using Portal to created a starting point deeper in the network will allow you more time when downloading resources and the Core.
  • Protect your Portal - the network will attempt to recapture the node instantly. Attack can not be started from the portal once it has been recaptured.
  • Beware of Scanners - since Portal takes a long time to install, Scanners may alert the network before you are able to completely install Portal on a node.
Hackers Wikia - Programs List
Programs Nodes Gameplay
Offensive Programs

Battering ram.png Battering Ram  Ion cannon.png Beam Cannon  Blaster.png Blaster  Kraken.png Kraken 
Maniac.png Maniac  Shock.png Shocker  Shuriken.png Shuriken  Worms.png Worms 

Defensive Programs

Icewall.png ICE Wall  Protector.png Protector 

Stealth Programs

Access.png Access  Dataleach.png Data Leech  Portal.png Portal  Wraith.png Wraith 

A.I. Programs

Beetle.png A.I. Beetle  Hawk.png A.I. Hawk  Squid.png A.I. Squid