Abilities

Abilities are actions that certain classes are allowed to perform.



General Day Abilities
Hack target - Try pwning the node (targets node, leaves log) the more people trying to hack the node, the more likely the capture. This ability is used by most of the NETSEC classes, neutrals such as the Rival Hacker, and sometimes, the Agent Leader. Hackck target has 5 different variations, depending on class:

Very low success chance - Spearphisher, Improvised Hacker, Sociopath.

Low success chance - Social Engineer, Analyst. Moderate success chance- Network Specialist, Rival Hacker, Agent Leader (If Computer Forensics passive allows you to use it).

High chance of success- Operation Leader,

Very high chance of success - Blackhat - (Unlimited uses)Create Hideout - Create a new hideout for you to escape to. Better safe than sorry, right? (Adds 1 charge to move hideout) Paired with the night ability Move Hideout - Useable by CCTV Specialist, Script Kiddie. (Two uses, Three day cooldown)

Unskilled Attack - Use some Script Kiddie tools downloaded from the web, they won't work, but logs will show your connection to the machine. Useable by Bounty Hunter, Journalist, Resentful Criminal, Corrupt Detective, Agent Leader (If Computer Forensics passive allows you to use it), Field Agent, Runaway Snitch (Five uses)

Download Intel - Search for important data on a hacked machine. This secondary objective can put us at an advantage, if we are lucky enough. Useable by Analyst, Improvised Hacker, Spearphisher. This ability allows you to find important data on a hacked device. Important intel can be figured out by Inside man, or placed by Corrupt Detective. Useable by Analyst, Improvised Hacker, and Spearphisher (Unlimited uses)

Impersonate - Impersonate your target by spoofing all your outbound emails tonight. (Send emails using your target as the sender) For one night, you send emails as the target of your ability. Useable by Social Engineer, and Resentful Criminal, and Mole (Converted Inv.) (Two uses)

Denial of service (DDOS) - Temporarily disable the node by flooding it with traffic (Cannot be prevented by any other skill) Stops any ability from being used on a node, except for Alter Logs. Useable by Blackhat, Script Kiddie, and Agent Leader (If Computer Forensics passive allows it) (Two uses)

Desperate Measures - Desperate times require desperate measures, become an Improvised Hacker. Useable by Enforcer, Inside man, and CCTV Specialist. When used, you become the Improvised Hacker role. (One use)

Plant Fake Information - Print and throw in the trash fake login information (Prevents success of Dumpster Diving for tonight) Prevents Dumpster Diving ability from succeeding from Inside man and Improvised hacker. Useable by Bounty Hunter, Field Ops Mole. (Unlimited uses, Two day cooldown)

Probe Node, Exploit vulnerability and Spearphishing Execution (does the same thing, with just some different numbers) Probe Node - Investigate potential ways to take over the target node. (Makes the node easier to hack into) Useable by Network Specialist (Unlimited uses). Exploit vulnerability - Use a vulnerability exploit on the target machine (Makes capturing this node a lot easier) Useable by Blackhat (Two uses). Spearphishing Execution - Spoof and email the website link to potential targets, tricking them into revealing their credentials (makes the target node easier to hack) Useable by Spearphisher (Unlimited uses, but must use Spearphishing preparation to refill uses)

Alter Logs - Physically access and tamper the log files of a target machine (Immune to Denial of Service) Useable by Field Agent, and Investigative Mole. (Unlimited uses, two day cooldown)

Rollback and Impartial Sabotage - (Same effect, but gives Journo a scoop for Impartial Sabotage) Rollback - Secure back a pwned target machine, as best as you can, adding fake logs in the progress. Useable by Agent Leader and Mole (Converted offensive). Impartial Sabotage - Your ethics have been... questionable. Get a scoop by creating some drama, sabotaging this node. (Rollbacks, leaves connection logs and fake logs) Useable by Journalist. (One use)

Harden Node - Apply security patches and stop unnecessary services to make the hack harder (Makes node harder to hack) Useable by Offensive Mole and Rival Hacker. (Two uses, Three day cooldown)

Jam Network and ISP Isolation - (Same thing, different numbers) ISP Isolation - Use a warrant to force the ISP to disconnect the target operative from the internet for today (Prevents network connections) Useable by Field Agent (Three uses). Jam Network - Use a jammer to temporally block all outbound connections from the target operative (Prevents network connections) Useable by Rival Hacker and Mole (Field Ops). (One use)

Role Specific Day Abilities
Bait Law enforcement - Send an anonymous tip to agents about your target being a NETSEC member. Hopefully, they will think a Bounty Hunter did it... Useable by CCTV Specialist (Three uses, two day cooldown)

0-Day exploit - You have been saving this 0-Day exploit for a special occasion. This is likely it. Try not to waste it. (100% chance to capture a node) Useable by Operation Leader (One use)

Grant Root access - Grant root access to the whole operation to a specific member. If you die or get arrested, that user will become the new operation leader. (If root is granted to an agent, and you get arrested or killed, you lose, as they have access to the whole operation and can take it down freely) Useable by Operation leader, One use.

Log Analysis - Cross reference network logs to find suspicious data streams. (Clears access log from tampered entries.) Useable by Analyst (Unlimited uses)

Wire Shark - Sniff out all traffic network, discovering eventually who is executing a denial of service attack. Useable by Network Specialist (Three uses, Three day cooldown)

Spill the Beans - Let agents know who you think is a NETSEC member. If arrested within 48h, you will get a bounty. Useable by Bounty Hunter (Unlimited uses)

Plant Keylogger - Plant USB keyloggers in the organization. Can be recovered during the night. - Usable by Inside Man (One use, but can be replenished by Retrieve Keylogger ability, after using it)

Insider Knowledge - Snoop around the office and learn the IP address of a valuable second target - Usable by Inside Man (Two uses, two day cooldown) (Lets you find intel which certain classes can download)

Script Kiddie Attack - Try hacking the target by using a well known and outlived exploit from a public database. Very unlikely to succeed. Useable by Script Kiddie (Three uses)

Crack Credentials - The Operation Leader is dead - you can attempt to crack his credentials to assume his identity... if root access was not transferred safely. Useable by Sociopath (Unlimited uses) (Doesn't work until Operation Leader is dead)

Get Bribe - Someone is willing to pay for information. And you will gladly sell your services (gain extra xp/coins at the end of the game, if a winner) (Gives useful intel to rival hacker). Useable by Corrupt Detective (Unlimited uses)

Upload Intel - Upload the stolen intel to the target node. (Only works after Steal intel ability succeeded) Useable by Corrupt Detective (No uses, uses can be given using Steal Intel, for one use) (Part of the detective's win condition)

General Night Abilities
Midnight Meeting - Meet with the target player to discuss important matters (occupies target, visits the target.) Useable by Blackhat, Analyst, Agent Leader. (Infinite uses, two day cooldown)

Move Hideout - Move to a safer hideout, making you safe from arrests, murder and deal attempts. Usable by CCTV Specialist, Improvised hacker, Rival Hacker, Script Kiddie (One use, can by increased by create hideout ability, or by Prepared for Anything passive for up to 3 uses)

Disorganized Murder - Try murdering your target. You know it will be messy. (Available from Night Four.) Usable by Enforcer, Resentful Criminal, Runaway Snitch (About 45% chance of working.) (Infinite uses from Night 4 onward)

Follow - Follow the target and learn who they will visit tonight (visits target) Useable by Inside Man, Sociopath, Corrupt Detective, Mole (Investigative). (Two uses)

Dumpster Dive - Check the dumpsters and trash bins for important information. (Decreases difficulty of a random node when successful) (Useable by Inside Man, Improvised Hacker) (Unlimited uses)

Doxx and Stalk - By doxxing and stalking the target, you will gain intel about the target (Learn the faction of the target player) - Useable by Social Engineer, Bounty Hunter (Two uses, Four day cooldown)

Interrogate - Sit down with your target for a... talk. Tomorrow, you'll be able to read their personal log (as of tonight) (Visits and occupies target) Useable by Enforcer and Resentful Criminal (Three uses)

Misdirection - Occupy everyone who visits you tonight (Occupies people who visit you) Useable by Spearphisher, Social Engineer. (Two uses)

Throw under the bus - Something doesn't feel right: better to have someone else take the fall tonight. (Redirect self to target player.) Useable by Social Engineer, Corrupt Detective. (Two uses)

Wipe - Wipe all content from this node: this includes all connection logs and potential intel. (Only useable on unhacked/rollbacked nodes) Usable by Mole (Offensive) and Rival Hacker (One use)

Frame - Visit and Frame the target player, so that it will appear as a random NETSEC class is arrested or killed (Framed status lasts the whole match) (Cannot be used on agents, instead saying that you cannot frame them) Useable by Bounty Hunter, Sociopath, Mole (Inv.) (Three uses, two day cooldown)

Wiretap - Wiretap the suspected hideout of the target, allowing you to read all the targets incoming and outgoing messages (emails) for the next 24 hours (visits target) Useable by Mole (Field ops) and Rival Hacker (Unlimited uses, three day cooldown)

Role Specific Night Abilities
Emergency Extraction - Send a hired team to move a member to a safe hideout (Doesn't occupy, doesn't visit) Useable by Operation Leader (Three uses, two day cooldown)

Install CCTV Surveillance - Install a CCTV system at the subject location. Allows for CCTV Surveillance as long as the target is alive and doesn't move their hideout. (Camera gets destroyed if hideout is moved) (Visited Target) Useable by CCTV Specialist (Two uses, Two day cooldown)

Escort - Escort the target operative to a new hideout, protecting from arrest attempts and murder attempts. Retaliate from murder attempts (Visits Target, occupies target.) Useable by Enforcer (Infinite uses)

Retrieve Keylogger - Retrieve Keylogger data, slightly increasing the chance of all our attack chances tomorrow - Useable by Inside man (Requires use of Plant Keylogger to work)

Ask the Right Question - Visit someone tonight to discuss the hack in person. Learn if that person has a legitimate "Hack Target" skill. (Visits target) Useable by Analyst

Cover Your Tracks - If they can't find you, they can't arrest you, right? You take extra precautions tonight, giving you a high chance to avoid an arrest tonight (Two uses, Likely to succeed) - Usable by Network Specialist

Review Connection Logs - Review connection logs to find out if the targets connection was cut off. Usable by Network Specialist (Two uses, Three day cooldown)

Spearphishing Preparation - Carefully craft a trap website. You will later use this to obtain stolen credentials (Grants 1x Spearphish Execution) - Useable by Spearphisher (One use, but refills every time Spearphishing execution is used)

Citizens Arrest - Attempt to arrest your target. Years in the force allows you to follow their protocol seamlessly: your cover will stay safe if you fail, except for noisy Journalists (Visits target) Useable by Bounty Hunter (Two uses, three day cooldown.) (Grants you an extra arrest to your goal)

Get Scoop - Covertly ask the right questions that will allow you to write an article later. (Visits target, occupies target) Useable by Journalist, grants a extra charge to "Write Article" Ability, except if you scoop neutrals, which doesn't.

Write Article - Write an article about the hack (You need to get a scoop from a non-neutral player first) (Gets you an extra article for your win condition) (Infinite uses, however scoop needs to be obtained first to be used). Useable by Journalist

Expose Operation Leader - The TV crew owes you one: send them and expose the target as Operation Leader (gain an instant article, if correct) (Visits target, occupies target). Useable by Journalist

Looking for an old friend - You know the old friend's face well. Lets get to work (Lets you know if your target is the original Operation leader) (Visits target) Useable by Resentful Criminal (Infinite uses, three day cooldown)

Murder - Visit and murder your target. If your victim is the Operation Leader, proceed with identity theft. Make it count. (Visits target, Occupies target, no rng involved) Useable by Sociopath

Steal Intel - Find anything useful at the AGENT'S HQ for your employer. Once found, you can then upload it, and consider your contract done. (Infinite uses, about 40% chance of working) Useable by Corrupt Detective

Strike Deal - Coerce a NETSEC member to flip to your side, in exchange for a pardon. (One less use in a game with less than 13 players in it, does not deplete on failure) Useable by Agent Leader (Two uses, two day cooldown)

Intelligence Informer - Use an undercover contact to obtain information about the target (Learn the target's faction and class type) (Two uses, two day cooldown). Useable by Agent Leader

Sting - Setup a sting, one time, operation. The target and everyone who visits him/her tonight will be arrested. Useable by Field Agent (One use)

Arrest - Attempt arresting the target. Your cover won't be blown in case of failure as you will direct the operation from an undercover van (except by noisy journalists) Useable by Field Agent (Infinite uses)

Planned Raid - Pose as a NETSEC enforcer and escort the target to an AGENT controlled safehouse - the target will be arrested by local police 24 hours later, not exposing you (Visits target, occupies target) Useable by Field Agent (Three uses)

Search for Keyloggers - Search for Keyloggers at the target building, and destroy them. Useable by Mole (Field Ops) (Infinite uses, two day cooldown)

Add Route - Connect the selected computer to a random nearby node when possible (doesn't leave logs). Useable by Mole (Field Ops)

Setup - Trick your target to into visiting someone else tonight (your target will be occupied) (Visits target, occupies target). Useable by Mole (Inv.)

Passive Abilities
Not a snitch - Snitches get stitches... so you would never accept a plea deal - you'd rather go to jail (conversion immune). Passive belongs to Operation Leader, Blackhat, Bounty Hunter, Journalist, Script Kiddie, Resentful Criminal, Sociopath, Corrupt Detective.

Perform CCTV Surveillance - Keep tabs on a person tonight. You will know if they have been visited tonight (Requires installation of CCTV first) (Basically, when you install a cctv camera, every night you can see what happens on it, until the person dies, is arrested, or has their hideout moved). - Passive belongs to CCTV Specialist

Diversion - You are ready to act as a diversion when escorting someone (you will be arrested instead of your target, if they get arrested the night you escorted them). Passive belongs to Enforcer

Target Knowledge - You can piece together scraps of information that you heard at the office - if you own a computer directly connected to the target, you will know it. Passive belongs to Inside Man

No Dirt on Me - You infiltrated NETSEC via questionable connections, but you actually didn't commit any crimes. AGENTS have no power on you (conversion immune, arrest immune unless framed). Passive belongs to Bounty Hunter, Journalist

Unsecured device - Agents will be able to recover -usually important- information about other operatives upon your arrest (The information is based on one person, saying They are (this class) or they are not (this class), for example it would say: Dr. Purple is Analyst or Dr. Purple isn't Sociopath. Its not very useful to arrest Script Kiddie for this, so don't even bother). Passive belongs to Script Kiddie.

Unstable Mind - Its easy getting information from you. If you are arrested, AGENTS gain one extra sting charge (regardless if your still Sociopath or stole the identity of Operation Leader). Passive belongs to Sociopath

Blackmailed Informer - The informer that is helping AGENTS will relay to you his intel (if the Agent Leader asks for it). It will also try to bribe a AGENT Detective... (So when Corrupt Detective uses get bribe, sometimes you get information off of it). Passive belongs to Rival Hacker

Prepared for Anything - Law enforcement can search for you as much as they want: they don't know about your hideouts (Move hideout has an additional two charges). Passive belongs to Rival Hacker

Agent Scum - Even though you are neutral, doxx attempts will show you as Agent. Upon your death, the original Operation Leader identity will be revealed to Agents (Not just agents, everyone.) Passive belongs to Corrupt Detective

Topology Access - You have unrestricted access to the physical network, thus know everything about the network topology. Passive belongs to Agent Leader, Field agent, Mole (Field ops), Mole (Converted Inv.), Mole (Converted Offensive), Runaway Snitch.

Hidden Passive, Fork the agents - Every single time a Bounty Hunter or a Field Agent attempts to arrest you, you learn their role. Passive belongs to Journalist.