Chaos Chain

Chaos Chain

Not enough ratings
System Hacking in Chaos Chain
By Corrosive Studios and 1 collaborators
This guide covers everything you need to know about hacking computer systems in Chaos Chain. This feature will come in version 1.6.1. The screens in game may differ very slightly (with extra hints/options added later) from what is shown in this guide.
   
Award
Favorite
Favorited
Unfavorite
Explanation

Successful Breach Screen (This is the screen you want to see - green means good)

The objective during hacking is to gain Control of all of the system Nodes to secure access into the system in question. In order to do so, the system's security protocols will need to be bypassed. The first thing that should be done during hacking is looking over the system analysis screen.


System Analysis Screen

The system analysis screen will provide detailed info necessary to accomplish the hacking process. Every system has four traits: Grid Depth (Total System Nodes), Integrity Rating (Denial Chance), Trace Rating (Detection Chance), and Firewall Rating (Counter Chance). Note that the percentage values can be reduced to a minimum of 5% and raised to a maximum of 95%.

Lower values on these traits represent a weaker system and can range from 1 to 5. Grid Depth is how many total Nodes that the system has and the amount that will need to be controlled in order to perform a successful breach. Integrity Rating is a measure of how difficult the system is to navigate.

A system with a high Integrity Rating will have a higher denial chance when you try to takeover a system Node. This means that the takeover attempt on the Node will fail outright, and then there is a chance that the system will be able to Trace the intrusion and activate the Firewall.

Every action performed while hacking has a chance of being detected while the Firewall is off. The Trace Rating dictates the detection chance. In the event that a hacking attempt is detected, the Firewall activates and tries to actively counter any further attempts to negatively affect the system it protects.


Successful Detection Avoidance Screen


Unsuccessful Detection Avoidance Screen

The Firewall Rating affects the chance that the system has to prevent and counter hacking attempts. As Control is gained of Nodes, it will get harder to avoid detection, but it will also be easier to gain further Control, and countering further attacks will be more difficult for the Firewall.

The next thing to do after looking at the analysis screen is to pick a suitable hacker. They must have a hackpad equipped and be in stable (not downed or drained) condition. Once you select a hacker, their stats will be shown as percentages next to the system's info. Then, programs may be used to boost these stats even more.


Hacker Selection Screen


Hacker Stats Display Screen


Program Selection Screen

Once the breach is initiated and hacking begins, there are always at least three actions that can be taken out of four total possible actions. The first is the most basic: Attempt Takeover. This can be done anytime. The hacker will go against the system's Integrity Rating to gain 1 Control point.


Hacking In Progress Screen (Note that the screen is still blue, which means that the system does not detect any intrusion yet

If the Takeover Attempt succeeds, the hacker gains 1 point of Control. If it fails, the Takeover Attempt is denied by the system. No matter the outcome, the system either: tries to detect the hack if the Firewall is not currently active, or tries to counter the hack if it is already active.


Successful Takeover Screen


Countered Takeover Screen

The second action that can be done while hacking is also available at anytime. Disconnect. The hacker disconnects from the system, suffers 10 Mettle damage, but can now retry the breach at no other negative cost. This may be necessary from time to time. It depends on circumstance.


Disconnect Recommended In Cases Like These (Low chances of success from repeated failures)

The third action in hacking can only be done if the Firewall is not currently active. Attempt Forced Capture. It represents the hacker using a quick method to gain 1 Control, but if detected, the Firewall will automatically activate and block the hack. Detection is still possible if Forced Capture succeeds.


Successful Forced Capture Screen

The fourth and final action in hacking may only be used if the Firewall is currently active. Attempt Firewall Override. The hacker will try to get around the system's Trace to disable the Firewall. Even
if successful in avoiding detection, it may still be countered and blocked.


Successful Override Screen

The last thing to know about hacking is that the system will become more capable of protecting itself as hack attempts fail during the current breach. If a hacker loses all Control of the system
and their next hack fails, the system temporarily goes into lockdown.


Breach Failed / Lockdown Screen (Red means bad)