Infiltrating a network is not just about getting your foot in the door.
You'll also need to defend your foothold and stop the network from slamming the door in your face.
Here are some defensive tips that even script kiddies should understand.
While the premise of this combo seems basic, the Stronghold is the foundation of many advanced tactics, one of which we've already talked about previously here.
ICE Walls have a very fast install time, and can quickly shield a node against attacks, enabling the installation of the slower, stronger Protector, which will regenerate itself while under attack, enabling you to launch an assault without worrying about losing your ground.
A great use of this tactic is to secure nodes with lots of program slots that can be used to cause chaos! Securing a Black ICE or a Guardian in the heart of a network can cause devastation when it is properly defended.
Additionally, if you used the Flanking tactic mentioned last time to capture a weak shortcut, you can also use this combo to quickly secure a node, while setting up for a modified Sweeper combo which uses Protector instead of Shocker, or one the combos we have coming next time ...
Disclaimer: No warranty is implied or guaranteed by these statements.
Don't be *that guy* - Always use protection.
Various ways of using programs during hacks
1 post • Page 1 of 1
Who is online
Users browsing this forum: No registered users and 1 guest