5/17/2023 0 Comments Carbonite hack![]() The targeted state gives you +3 to your BS when you shoot that enemy, or +3 to your WIP when you hack that enemy. The spotlight program allows you to target enemy troopers.There are three main reasons to use a hacking device: We’re not going to exhaustively cover everything because all the information is available there on the wiki. You can also check out Captain Spud’s fabulous tool here: The list of hacking devices and programs is available here. It’s important to have a clear understanding of the utility that each device brings before you make your list-building choices. Let’s go into more detail about hacking devices. Some hacking programs have exotic ammunition which halves the enemy’s BTS value, or forces two saves per successful hit. Most hacking attacks require the opponent to roll saves using their troop’s BTS attribute, but the spotlight attack causes an automatic effect, without saves being allowed. All hacking related skills (reset, and hacking attacks) use the WIP attribute for the roll. Some others may modify the opponent’s WIP attribute too). You calculate modifiers (some hacking attacks give you a modifier to your WIP roll, but most do not.You check that you’re within hacking range and that the hacking attack is a legal declaration.You declare your second short skill (picking the hacking program you want to use).If the enemy wants to oppose the incoming hacking attack with a face-to-face roll then they need to declare a reset, a hacking attack, or a BS attack.You declare your first short skill (move / idle / etc.).When hacking an enemy the following procedure is followed: The value of using reset is that you can declare it even if you cannot see the enemy hacker. You can ‘dodge’ enemy hacking attacks by declaring the reset skill, which uses your WIP.You can oppose hacking attacks with face-to-face rolls by declaring a shot (if you can see the hacker), a hacking attack of your own, or a reset.When making a roll as part of a hacking program you use the hacker’s WIP attribute.If your hacker is physically within the zone of control of an enemy repeater then all enemy hackers on the table are within your hacking area.Your hacking area is the zone of control around you (an 8” bubble around the troop), and the zone of control of any repeaters you own (so an 8” bubble around them too).You can use your hacking device to hack targets that are within your hacking area.* Killer hacking devices possess the only program that can kill a target outright What you can do with your hacking device depends on which device you have:.There are four kinds of hacking devices: hacking device, hacking device plus, killer hacking device, evo hacking device.To hack a target you need some kind of hacking device.The mechanics of hacking are actually reasonably simple once you break them down. If you’re playing a faction or list that has slightly lower conventional firepower, the addition of hackers might allow you to go toe-to-toe with your opponent’s big guns, without you exposing yourself to risk, because you can stay hidden whilst you hack! This allows a hacker on a rooftop to attack a nearby TAG without the TAG being able to do anything except reset (reset is like declaring a dodge but it opposes hacking attacks). Hacking is one of a small handful of skills that allows you to attack enemies without being seen. This is absolutely crucial to understand. In terms of having a unique approach, hacking does not require line of fire. A possessed unit counts as yours for control purposes – so you can enjoy turning your opponent’s guns against them! An isolated unit cannot have any orders spent on it except its own, so an isolated TAG is far less dangerous. And whilst hacking programs can’t kill a TAG, they can, for example, render the TAG either isolated or possessed. Whilst bullets might bounce harmlessly off a TAG, hacking programs have a really good chance of getting through much more quickly. In terms of power, hacking allows you to deal with opposing units in efficient and remarkable ways. It allows you to approach problems in unique ways.There are two main reasons that you should care about hacking:
0 Comments
Leave a Reply. |