Hackers:Tactics - Part 8 - The Backdoor Combo

Various ways of using programs during hacks
Posts: 1032
Joined: Wed Sep 21, 2016 2:46 pm
Location: UK

Hackers:Tactics - Part 8 - The Backdoor Combo

Postby Luminaar » Fri Mar 23, 2018 4:20 am

Breach and Clear, soldier!

The Sentry is a very powerful node to have on a network. Capable of turning the meekest of B-coin Mines and the feeblest of Farms into nodes capable of widespread chaos, a Sentry has the potential to turn every node on the network into an offensive force that needs to be dealt with.
8 - Backdoor.png
"To ensure that your whole host may withstand the brunt of the enemy's attack and remain unshaken" : Sun Tzu, The Art of War - Chapter 5
8 - Backdoor.png (145.8 KiB) Viewed 1911 times
The only weakness of a Sentry is the time is takes to spread around the network. Preventing the spread of an antivirus - or subduing the Sentry completely - can make the difference between an easy win and a crushing defeat.
8 - Backdoor - Sentry Stopper.png
Control the Scanner, stop the AV!
"Hence the skillful fighter puts himself into a position which makes defeat impossible" : Sun Tzu, The Art of War - Chapter 4
8 - Backdoor - Sentry Stopper.png (113.92 KiB) Viewed 1911 times
8 - Combo_Backdoor.jpg
"You can ensure the safety of your defense if you hold positions that cannot be attacked" : Sun Tzu, The Art of War - Chapter 6
8 - Combo_Backdoor.jpg (196.82 KiB) Viewed 1911 times
The Backdoor combo can be used to limit the spread of Sentry reinforcement, and can have a huge impact on reducing the overall strength of a network. Using Portal to gain control of a central node, then using Shuriken to nullify the antivirus before it can spread, can render entire sections of a network impotent!

Weakening a network prior to attack will also reduce the cost of programs required to hack it successfully. As mentioned previously, a b-coin saved is a b-coin earned!


Portal onto an Black ICE or Core to maximise the damage output of Shurikens, or Portal onto a Guardian to prevent them from deploying shields. For the ultimate ease in network capture however, Portal directly onto a Sentry and chop the defenses off at the root!

Disclaimer: No warranty is implied or guaranteed by these statements.
There are 10 types of people in the world. Those that can read binary, and those that cant.


Who is online

Users browsing this forum: No registered users and 3 guests