Hackers Wikia
Register
Advertisement


  Български - Неусетни  简体中文 - 隐型病毒  正體中文 - 隱形程式  Čeština - Tiché  English - Stealth  Français - Furtivité  Deutsch - Stealth(Deutsch)  Bahasa Indonesia - Program Sembunyi  Italiano - Furtivi  日本語 - ステルス  Bahasa Malayu - Serangan Hendap  Polski - Niewidzialne  Português - Furtivo  Română - Invizibil  Русский - Невидимый  Español - Sigilo  Türk - Gizli  Tiếng Việt - Tấn Công Lén


Access Dataleach Portal Wraith
Access Data Leech Portal Wraith

Summary[]


Stealth programs allow Security Nodes to be disabled, resources to be looted, and backdoors to be established inside the network, all before the network security is activated.

  • Data Leeches can be used in Brute Force or Stealth hacks to download resources and data at an increased rate.
  • Access allows other stealth programs to be installed on connected nodes.
  • Wraiths disable any node on which they are installed for the duration of a hack, preventing any special abilities from being active or any antivirus from spreading.
  • Portals capture nodes on which they are installed in stealth, allowing offensive and defensive programs to be installed at the beginning of a Brute Force hack.

Statistics[]

Each program takes a certain amount of time to be installed on a node, during which the program is not active. Each program also takes a certain amount of disk space, which it occupies in program libraries once it is compiled. Finally, each program also takes a certain amount of time to assemble in the Compiler. Programs can be compiled instantly by using Credits.

Stealth Program Statistics
Program Install
Time
Disk
Space
Compilation
Time
Data Leech 1.0 Seconds 3 30 Seconds
Access     1.0 Seconds[1] 1 1 Minutes
Wraith 2.0 Seconds 5 15 Minutes
Portal 6.0 Seconds 10 20 Minutes

Performing a Stealth Attack[]

A Stealth hack will commence if the first virus placed on a netConnection is the Access program. This places the network into Access Mode. The timer will show "--.--" and a "Visibility" bar will appear showing the amount of time left before you're discovered on the network. This bar of Visibility has a maximum capacity of 3600.

Stealth attacks have a Visibility cost, stated in cost per second.

  • Wraith has an install time of 2 seconds and Portal has an install time of 6 seconds. Data Leech also has an additional cost based on the time it takes to download resources or Core data.
  • Programs installed on a Code Gate will have an increased cost in relation to its Filter strength.
  • A Scanner will increase the cost of installed programs within 3 nodes by its Sensitivity statistic.
  • Networks also have a natural stealth detection of 20/s. This statistic is shown on the Core for display purposes only - disabling the Core during the Stealth period does not make you harder to detect.

Visibility costs are applied while a program is installing and/or remains active on the network during the Stealth phase. Every Stealth Program except Data Leech removes itself from the network once it is installed. Data Leeches will remain active once installed, incurring a visibility cost each second, but will self-delete from a node once all resources have been downloaded or when the Stealth phase ends.

Examples[]

  • A Level 3 Access costs 150 visibility/sec. It would take 170 visibility to install the program, 200 visibility to install on a node within 3 nodes of a Level 1 Scanner and 680 visibility to install on a level 1 Code Gate.
  • A Level 5 Data Leech costs 20 visibility/sec. It would take 40 visibility to install the program onto a Core, and would cost an additional 40 visibility per second of the Core download. If the Core was in range of a Level 7 Scanner, it would cost 60 visibility to install, and an additional 60 visibility per second to download the Core.
  • See this video for an example of a stealth hack in action.

Tips[]

  • If you use any attack that isn't a Stealth attack, the Stealth phase ends and the network attacks you as normal.
  • When the Stealth phase ends, all Stealth programs currently being installed are removed, along with any active Data Leech programs.
  • Wraith removes itself once installed. Nodes disabled by Wraith will stay disabled for the duration of the hack.
  • Portal also removes itself once installed. Nodes affected by Portal are considered captured by the attacker and can be used by the attacker to install programs directly.
  • Stealth hacks are untraceable if the player leaves the network before the Visibility Meter fills to 3600.
    • If the security is activated, the player will be retraceable even if no programs were installed.
  • Using this information, an attack on a network can be planned, with techniques such as:
    • Steal all the Resources and quickly disconnect.
    • Download the Core directly for easy Reputation.
    • Soften up the Security Nodes before launching a full scale assault.
    • Capture / Access all Node for easy Vengeance (Although Risky)

References[]

  1. When Access is placed on a Code Gate with an active filter, the installation time is increased according to the filter statistic:

    Where F = Code Gate Filter
Hackers Wikia - Programs List
Programs Nodes Gameplay
Offensive Programs

Battering ram Battering Ram  Ion cannon Beam Cannon  Blaster Blaster  Kraken Kraken 
Maniac Maniac  Shock Shocker  Shuriken Shuriken  Worms Worms 

Defensive Programs

Icewall ICE Wall  Protector Protector 

Stealth Programs

Access Access  Dataleach Data Leech  Portal Portal  Wraith Wraith 

A.I. Programs

Beetle A.I. Beetle  Hawk A.I. Hawk  Squid A.I. Squid 

Advertisement