Welcome, Guest. Please login or register.

Login with username, password and session length

 
Advanced search

1411508 Posts in 69374 Topics- by 58430 Members - Latest Member: Jesse Webb

April 26, 2024, 10:31:01 AM

Need hosting? Check out Digital Ocean
(more details in this thread)
TIGSource ForumsPlayerGamesGames with hacking
Pages: [1]
Print
Author Topic: Games with hacking  (Read 1490 times)
K
Level 0
*


View Profile
« on: June 24, 2017, 08:46:09 PM »

Hi, I wrote an article about hacking in games for a website that never used it. It's a little rough, missing many entries but have had it sitting on my HDD for over a year and just want to put it out there. Anyway, here it is in its entirety:

Hacking: an abridged and brief video game retrospective


Here we are now in the year 2016, where a hack has matured past its early associations with esoteric knowledge of terminals to mean a nifty way to fold a bed sheet or organize your cables. Though in this retrospective we'll be looking at something closer to circumvention or disruption of security and foes.
Hollywood, in their representation of hacking have gone from your microwave set and forget one click options to some god-knows-what virtual rubric’s cube. Video games, similarly, have treated it as something that can be completed by simply clicking a terminal to a virtual heist and everything else that is as far removed from actual hacking as you can think of. As you would expect, hacking is either part of the multiple-approach to problem solving that makes your life a little easier, a little quirky aside or a core component needed to complete a mission. And as you've probably discovered yourselves, the term has grown to extend far beyond your simple terminal. I’ve included these iterations to include other interfaces/machines/equipment and whatnot that require bypassing and/or manipulation in a number of unique ways. Below is by no means an exhaustive list, I did miss a few sequels here and there, and hacking games that I just didn't know about (or was too lazy to include). This list looks more at the hacking mechanic than the game and story it's wrapped in, as a way to see how hacking has changed over the 30+ years it has been a feature in games, and to serve as a compilation rather than a critique. So, let us concern ourselves with this enigmatic process as it appears in video games.



System 15000 1984 A.V.S
Noted as being the first game to simulate hacking, this game was likely not incidental, coming not long after Ferris Bueller played a game of global thermonuclear war with a bored supercomputer. You receive a letter asking you to help a mutual friend recover funds by hacking into the system. This was a command based game and after using the number and access code supplied you head off on your quest to dial into databases and bulletin boards where more logins and numbers are obtained. System 15000 refers to the hacking software at your disposal. It wasn’t the most intuitive game, not unlike games of the time, it seems there was some guesswork as much as logic to your plight.

Hacker 1985 Activision
Possibly the second earliest game to utilize hacking. Interestingly, information regarding how to play was sparse (non-existant), and so after booting up the game and facing a login screen, you were essentially hacking from the get go. Forget about password crackers, your only tools were your wits and a bit of luck (if you can call that a tool). And not to be left stranded, if you couldn't guess the initial logon password with the hint provided, you were eventually given access due to a computer malfunction.

Neuromancer 1988 Interplay
Taking place in a future Japan we all want to see, cyberspace was a large part of this game, loosely based on the book of the same name. Your deck is your ticket into cyberspace. Plot wise your cyberspace buddies have done a disappearning act and you want to get to the bottom of it. Hacking had you bypass enter quasi 3D cyberspace and go head to head with Intrustion Countermeasure Electronics (ICE – which would be found later in System Shock) to gain access to those juicy databases by using a variety of software at your disposal. Potentially the first game to include upgradable hardware and software, of which is ubiquitous now. Passwords were acquired in the real world by approaching women in bars. “I wanna buy some info, babe” would do the trick. You can also hack into bank accounts for money to upgrade software - and buy back your limbs.

Shadowrun (Genesis/Megadrive) 1993 Beam Software
You’ve got hacking and then you’ve got Shadowrun. Before we were forced to swallow the red pill, a few years earlier we were going on matrix runs in Shadowrun as a Decker. Gaining access to these networks required entering the password or running permutations using your cyberdeck. This was just the initial stage as you then went up against ICs protecting the nodes within. ICs could be a minor inconvenience or a big threat to the utilities you carried in your cyberdeck. These utilities could be used for thorough hacking of networks. You could analyse the programs and download data, like any real hacker would. Shadowrun turned hacking into a tense and ultimately rewarding battle, which was just as well as it was a core mechanic. Your cyberdeck was a serious piece of equipment, with stats that affected cyberspace performance, memory, storage and load/IO speed; and then there were the attributes, with masking (how well you remained undetected in the matrix and success when running Deception) arguably the most important.

System Shock 1994 Looking Glass Technologies
In System shock you are the hacker. Find your way to the nearest cyberjack and you'll be telerported into full 360 degree cyberspace, a bit like Descent. Inside you often needed to destroy the ICE and break through the shields protecting a data cube or access to another area. This meant shooting it with your pulse software and sometimes using a decoy to distract it. Within this vector hell you could also collect upgrades and tidbits left behind by crew members. There was also the door hacking component in the physical world.  This meant rearranging wires on either side of a fuse box thing to their optimum position which would raise the energy high enough to open the doors. There was no consequence besides not getting the damn door open and you really just fumbled around with the wires for as long as it took.

Fallout 1997 Interplay Entertainment
In Fallout you could access terminals if your Science skill was high enough. You could even gain backdoor access by beating the computer in a game of Blackjack… well not actually "play" play. Hacking could help you bypass force fields. However, as with the open ended nature of how you completed tasks, this wasn't compulsory.

System Shock 2 1999 Irrational Games, Looking Glass Studios
To hack you need at least some hacking skill and it does use nanites (currency). The interface is a grid of nodes of which are either green (good) or red (bad). Illuminating 3 green squares in a row is a successful hack. You are given a percentage of the likelihood of changing a node green. There are also ICE nodes, which if you fail to hack, prevents any more hacking attempts and can alert security. Naturally, increasing your hacking skill and using hack software increases your chance of a successful hack.

Deus Ex 2000 Ion Storm
Here you could upgrade you hacking skills, but it pretty much came down to pressing a key when near a computer and waiting. With that said, hacking was a good investment here, often saving you the trouble of bloodier/more roundabout means. While the hacking aspect itself was simple, the spoils had far reaches, like having turrets take out guards and what not. Some terminals were a quick in and out affair before an alarm was sounded.

Uplink 2001 Introversion Software

Hacking is your bread and butter in the year 2010. You can perform jobs for competing companies or do your own thing. Interesting was the idea of covering your trails by deleting your logs left on the network hacked, to prevent being traced. Prior to hacking you establish bounce routes through other servers by selecting them on the world map, giving you ample hack time. Because once you initialize hacking, the tracing would start, so the game became a race against the clock. If the trace reached you, you were booted from the system or given a nice little mark against your criminal record. More machines and machines where you have say an account or admin access give you longer time. It’s a matter of selecting the right tool for the job, which usually involves having a sufficient version of a software, and a decent enough Gateway (the system you use) adjusting CPU usage to perform action, like download files quicker and letting it play out. And remember, never connect directly to your target server. There are also tongue in cheek references to our favourite hacking movies like Sneakers and Hackers. As what I assume happens in the real world, as a hacker, you get a neuromancer rating that tells where your morals lie as a hacker. Anarchy against companies is seen as good, while being a snitch like tracing another hacker are bad. Missions involved a whole lot of activity like changing details of a file, destroying databases, transferring money and framing people for crimes. This game set a precedent for future hacking sims.

Sly Cooper 2002 Sucker Punch Productions

Only one glorious moment of hacking in the first game which is probably the most arcade like hacking of any game and thus most suitable for the next Hollywood film. Here it’s basically a twin stick shooter where you need to shoot enemies block things and collect pieces of code before you’re cut off by the firewall. In Sly 2 and subsequent games, hacking once again meant controlling some vehicle and shooting obstacles in a similar virtual environment.

Enter the Matrix 2003 Shiny Entertainment
You can get by without having to use the hacking system (unless you wanted to unlock 2 player mode), which is odd considering how prominent it was in the movie. You hack a DOS like interface (that has a strange Blackberry touch pad on the bottom – welcome to 2003) in pristine green and black. As with DOS you started off in the root directory, here A: and using commands like HELP DIR, you get clues as to how to navigate your way around. There were a couple of folders that had a few executables and the option to input cheat codes - remember when they were a thing? Accessing the other drives and folders had different goodies and puzzles to solve. You can even get the phone numbers to Morpheus and Trinity (I suppose they didn’t slap enough money in Keanus face).

EVE Online 2003 CCP Games
After finding data or relic sites with your data probe you can use your hacking or archaeology module to target the structure of interest, you’re taken to a UI with nodes. You explore adjacent nodes with the aim of destroying the systems core using a virus to damage the coherence of the defense subsystems. You start clicking through the adjacent nodes until you hit a roadblock in the form of a firewall which you will most likely need to attack. Weighing your own coherence and strength against that of the firewall, you can ascertain your chances of eliminating them. There are also subsystems within that can help or hinder your progress. Destroying the system is a successful hack, and releases goodies from cargo into space for you to collect.
« Last Edit: June 30, 2017, 02:32:52 AM by K » Logged
K
Level 0
*


View Profile
« Reply #1 on: June 24, 2017, 08:46:36 PM »

Splinter Cell 2005 Chaos Theory
Before Watch Dogs there was Sam Fisher wirelessly hacking on any PC that would let him using the EEV in his binoculars. When hacking, you’re presented with several lines of code on the left and four sets of changing numbers on the right. Essentially when the numbers light up you click them to lock them in, the panel on the left is irrelevant. Hacking is not just useful for making your life easier, it’s also essential to some missions, for example when you need to plant fake emails on someone’s computer.

Bioshock 2007 2K Boston, 2K Australia
In line with the worlds steampunk aesthetic, hacking required you to connect pipes from one side of the screen to the other to get the liquid across which would activate bots, tamper security systems and turrets and reduce prices from your favourite vending machine.

Mass Effect 2007 Bioware
The best way to describe hacking in this game is Frogger – you make your from the outer circle crossing into each small concentric circle while avoiding what I hope actually are vehicles. Doesn't feature logs.

Fallout 3 and 4 2008, 2015 Bethesda Game Studios
The more recent Fallout games allowed hacking using passwords (which come about through conversations or holotapes) or keys along with the Science skill and was generally more prominent than prior Fallout games. Hacking wasn’t as simple as clicking a terminal and hoping your Science skill was high enough, here you have a screen full of words mixed in there with jargon. Using a bit of luck and deduction you click on a word and are told how many letters in the word you picked were part of the actual password, if you didn’t get it correct already. Maybe you should watch the video. After 4 attempts you're locked out.

Slavehack 2009 Slavehack
Slavehack is an online browser hacking game where you can choose the pacifist lifestyle or go full DDoS against NPCs and other players. You start with a meager system machine (as long as it can play Civilization, who cares, right). Because you’re connected to other players, you can (and should) hack them, because it will likely happen to you either way. This involves finding other players IP address(left behind in logs, checking the high scores or simply asking), uploading viruses, and spamming, while protecting your own computer from infiltration. Once again, clearing your logs is important. You have a list of slaves, the other computers you’ve accessed and the handiwork you’ve left on the systems. You can attempt a DDoS which only increases the risk of you being DDoSed. To go about this you install viruses on multiple slaves, then launch an attack using a .rddos program. This usually damages the targets cpu, connection and HDD, deleting files.

Alpha Protocol 2010 Obsidian Entertainment
Alpha Protocol uses a word search of sorts with an ever changing array of letters. Within this grid is two halves of a password that you need to lock in place. It can be overwhelming trying to hone in on the codes in the hyper jumble.

Bioshock 2 2010 2K Marin, 2K Australia

The sequels hacking sequences work very differently, where it's now a test of your reflexes against an erratic needle moving across a bar. You need to time it so the needle landed on the green or blue (for bonus) areas at least once to effectively do the same things as you did in the previous Bioshock game. It should be mentioned that landing on red would lead to undesirables things like a shock or sound an alarm. You could always retry after a failed attempt, although the world was still moving around you so you’d better hurry up before those bots send you to the closest vita-chamber.

Hacker evolution 2010 Exosyphen Studios

At first glance there appears to be many similarities between this and Uplink, including the interface, creating bounced link and the usual cracking and decrypting of files. HE is however command based, requiring you to type in commands, and unlike Uplink, deliberation is favoured over speed. You will scan servers, access ports and decide how you will hack the passwords. There is a steep learning curve and it can take you a while before you work out your next move, but this game presents one of the best hacking challenges. While hacking may be different in the real world, at least this game didn’t use spinning cubes to illustrate their point.

Deus Ex: Human Revolution 2011 Eidos Montreal

Hacking is a mini game where you endeavor to capture at least one green node before having the system catch your blue one. You need a sufficient Capture ability that at least matches the system you plan to hack. Once inside it’s a good idea to observe the layout and plan your moves in advance, picking the easier nodes to hack first, fortifying (which slows down the systems attack on you) and trying to earn XP. Once detected it get a little frantic where you just fortify captured nodes and capture the green node(s). Deus Ex being what it is you can get hacking augmentations like stealth to decrease chance of detection. The hacking interface lays out your goal, enemies and nodes to you can choose to capture. To help you can use special actions to get a free pass on being detected or immobilize the system for a few seconds. Just like its predecessor, hacking returns dividends in its usefulness.

E.Y.E Divine Cybermancy 2011 Streum On Studio
E.Y.E offers up a mini game where hacking involves uploading a virus to the target machine/victim. The aim is to exhaust their HP before your own is depleted. You pick from a number of viruses and unleash them, waiting for its completion to use the same or another. You have a virus for harming the target, providing a shield, lowering targets defense or as with the Overflow virus a combination of attack, but a decrease in your own defense. Determining a winner can come down to speed of applying the viruses.

Codelink V2 2012 Momoguru
Taking inspiration from Uplink, Codelink is a MMORPG that gives you a multitude of software and hardware choices, provided you have the money which you (legitimately!?) borrow from a bank. The bigger the hack the bigger the risk and again we need to hide our trail and impede tracing, while getting increasingly better firewall crackers, proxy bypassers and password crackers. Crackers have their own mini game that improve the efficiency at which they work. There’s a good feel to this game, like you are installing software and breaking codes. Things don’t happen insantly, you can make a coffee in the time it takes to crack a password. A Codelink 3 is in the works.

Bioshock 3 2013 Irrational Games
The base game removed those hacking methods found in the previous games and instead relied on you using possession vigors (not plasmids) to control man and machine alike. Having your hacking tied up in a vigor streamlined the flow of gameplay don't you think?

Gunpoint 2013 Suspicious Development
While you hack computers in this game to get sensitive information etc, the real hacking comes from the games Crosslink system, which allows you to rewire controls, manipulating the buildings doors, alarms and switches.
Gunpoint | Stealth! Puzzles! Hacking!

Saints Row IV 2013 Volition
Hacking is needed to take control of stores and earn you income. Kind of like the Bioshock hacking mini game, you need to create a path for the current to pass through from one side to the other. On the right side of the screen are the blocks that you must use to achieve this.

Light 2014 Team 17

You're a man who looks more at home in a game of Tetris, but that doesn't hinder you in any way from using a computer. Simply hold Q and voila, terminal hacked. Besides opening doors and disabling cameras it provides narrative to you and you're circumstance. Can't help but think of worms though.

Hack 'N' Slash 2014 Double Fine Productions
Use a sword with a built in USB connector to hack the game itself - which can end in it crashing. Swishing it against an object brings up a list of properties. For example, inside SpikeyTurtle you can change the values of a dozen properties like move speed, faction and perception distance. Later on you can enter the (much more volatile) code itself, represented as a room with terminals that you then play around with, searching functions and changing operators.

Watch Dogs 2014 Ubisoft Montreal

The immensely hackable world of Watchdogs is made possible due to the interconnectivity of ctOS, software that basically operates the cities infrastructure. And you can control it via smartphone with the click of literally one button. There’s the usual hackables we’ve seen previous like cameras and security gates, those more distinguishing like forklifts and pitching machines, and another set dedicated to wreaking havoc on the roads like being able to raise bollards and spikes and change traffic light colour to hinder pursuers. Proficiency in these dark arts can be improved with XP.
Watchdogs Free-Roam Gameplay - Hacking, Robbery & Theft lol

Else Heart.Break() 2015 Secret Arcade

This is the closest we've seen to a sandbox hacking game, where your hacking tool, the modifier, allows you to go modestly nuts in the town. Taking it one step further than Hack N Slash in what we can get away with under the hood, we're seeing Boolean logic, arrays and loops within the games own fleshed out programming language, Språk, which is largely influenced on BASIC.  It is still it's own language so you do need help (which is scattered about) on syntax and functions. Whatever you may say of the language itself, it's a big step to be seeing something like this in game. Track people, electrocute them, and get yourself out of jail, just like the NSA.

Hacknet 2015 Surprise Attack Games
Claiming to use real hacking processes, Hacknet uses UNIX based commands and while there is a nice GUI you can turn this off for a real challenge. You receive software for completing quests that allows you greater hacking flexibility. And while you do meet barriers in terms of inadequate software, it has no levels and so feels less game like. Deleting files and changing IP addresses all within a command prompt kind of brings us full circle to the earliest games on the list.

Shadowrun Hongkong 2015 Harebrained Schemes
You play a minigame that involves repeating a sequence of digits to increase time you have to solve another pattern of symbols. In this second part, you have 10 sets of symbols. By watching the flashing intermittent flashes symbols in the top chamber, you deduce which of the 10 combinations it’s referring to. It comes down to memorization.
New hacking mechanic in Shadowrun Hong Kong

XCOM 2 2016 Firaxis Games
Available to all soldier classes but only really comes alive when done with a specialist soldier, hacking presents a large risk-reward outcome. The rewards are quite varied, including a potential to increase stats of a soldier (or team), getting your hands on an alien facility lead (research projects that allow new tech.) or gaining control over an enemy. Though a failed attempt means your cover might be compromised, enemy reinforcements are called in or you just dang gone increased the stats of the enemy. When near a suitable target you select the hack option which brings up a tablet with the options available to you. You can opt to perform a safe hack or a riskier one, with the rewards being relative. XCOM being about developing your soldiers, the hack attribute can also be strengthened.

Quadrilateral Cowboy TBR Blendo Games
You’re a hacker in the 80’s decked out with a 56.6k modem (of which I only got well into the 90’s). You help agents in the field by creating programs to bypass security, for example creating code to disable a security camera, to allow enough time for them to pass.

Hacking, 30 years on
Hacking is analogues to problem solving and here we can see that there really is no limit to how that can be represented. The term hacking does seem to carry with it expectations as can be seen with the response to the "overly simple" system implemented in Watch Dogs. But the reality is there is no optimal hacking system, just one of best fit. What we have seen is the use of simple commands, symbolic representations, virtual worlds and most recently reshaping the code itself. Recently hacking in some sense has returned to its roots, though this time we are being given more freedom. Though even the latest offerings are limited in what they allow you to do. Allowing greater freedom can lead to a greater chance of something going wrong - look at Hack 'N' Slash as an unfortunate example of that. With that said, giving the player the choice to tinker with anything at our own discretion and risk may be an avenue to explore further.

Logged
WarpQueen
Level 0
***



View Profile WWW
« Reply #2 on: June 29, 2017, 04:03:55 AM »

No Uplink!?
 Cry Cry Cry
Logged

K
Level 0
*


View Profile
« Reply #3 on: June 29, 2017, 05:22:39 PM »

It's in its chronological order but it's there!
Logged
Superb Joe
Level 10
*****



View Profile
« Reply #4 on: June 30, 2017, 01:11:03 AM »

Nier automata baby
Logged
s0
o
Level 10
*****


eurovision winner 2014


View Profile
« Reply #5 on: June 30, 2017, 02:15:11 AM »

The nier automata hacking minigame is my favorite hacking minigame probably.
Logged
K
Level 0
*


View Profile
« Reply #6 on: June 30, 2017, 02:32:20 AM »

Cool, I haven't played it but now I'm curious! This was written before that was released, but can you give an idea of how it works? And anything else I've no doubt missed out on  Well, hello there!
Logged
ProgramGamer
Administrator
Level 10
******


aka Mireille


View Profile
« Reply #7 on: June 30, 2017, 04:31:37 PM »

The nier automata hacking minigame is my favorite hacking minigame probably.

before the credits scene, I would have agreed.

post-credits scene, wholeheartedly disagree. I don't want to see another hacking minigame or a credits shmup for a decade after that.
Logged

woodsmoke
Level 4
****



View Profile
« Reply #8 on: July 03, 2017, 05:35:27 AM »

Mechassault: Phantom War (Nintendo DS)
You pick out the right symbols with your stylus from a waterfall of symbols.
"your hacking skills are incredible!!"
 Tears of Joy  Roll Eyes
Logged

b∀ kkusa
Global Moderator
Level 10
******



View Profile
« Reply #9 on: July 03, 2017, 08:11:52 AM »

Grand Theft Auto V: Hacking is an activity that consists of breaking security codes to get information or access.The player connects their Mobile Phone to whatever device they are attempting to hack. An interface is presented and the player must navigate to their "external device".
There are multiple hacking minigames depending on the device being hacked.
Logged
Pages: [1]
Print
Jump to:  

Theme orange-lt created by panic