Hackers:Tactics - Part 3 - The Flanking Combo

Various ways of using programs during hacks
Post Reply
Posts: 1150
Joined: Wed Sep 21, 2016 2:46 pm
Location: UK

Hackers:Tactics - Part 3 - The Flanking Combo

Post by Luminaar » Tue Aug 08, 2017 12:23 am

Seen a shortcut through your opponent's network, but Attack Priorities are distracting your programs?
3 - Flanking.jpg
Single Target programs will aim for the Code Gates
3 - Flanking.jpg (107.83 KiB) Viewed 3703 times
There's an a̶p̶p̶ program for that :D

Smart network designers will try to grab the attention of your programs, using high priority nodes to protect their weak points and leading you away from their resources. Don't get distracted - and ensure your programs don't either!

3 - Combo_Flanking.jpg
"Supreme excellence consists in breaking the enemy's resistance without fighting" - Sun Tzu
3 - Combo_Flanking.jpg (196.6 KiB) Viewed 3703 times
The Flanking combo can be used to easily sidestep your opponent's traps, leading you on the literal fast track to victory!

Use an ICE Wall to block attacks, and let a few Shurikens show you the shortcut through the network. This works especially well when there's a slow firing Black ICE or a high defence but weak attack Code Gate connected, that would normally capture the attention of your single target programs.

As a bonus, this tactic can also be used as a cheaper Sweeper tactic mentioned previously. Be on the lookout for nodes that have no Security nodes attached and clean up those resources!

If you do use this tactic to capture a weak link, you'll need to be ready to defend it. More tips on that next time! [/size]

Disclaimer: No warranty is implied or guaranteed by these statements.
There are 10 types of people in the world. Those that can read binary, and those that cant.

Post Reply