Hacking guide: our tutorial for the breach minigame | Cyberpunk 2077

Hacking guide: our tutorial for the breach minigame | Cyberpunk 2077

 Hacking is very important in Cyberpunk 2077 and opens up many possibilities for you to deal with situations. However, at first glance the hacking system is a bit cluttered and the breach protocol minigame in particular can be confusing. In our hacking guide you will find out everything you need to know.

These are the basics of hacking in Cyberpunk 2077

In the introduction to Cyberpunk 2077, the hacking is explained to you, but questions can still arise in the further course of the game, since the entry kills the player with information. That's why we simply summarize the hacking basics below:

  • With L1 / LB you activate the scanner. If you have a suitable target in your sights (opponents and devices such as cameras), the quickhacks that you can use are automatically displayed.

  • Which quickhacks are available to you is determined by the cyberdeck that belongs to your character's equipment. The quickhacks are equipped in the Cyberdeck.

  • If you want to perform a quick hack, you have to spend saving points. These are also primarily defined by the equipped cyberdeck. If you imagine a classic role-playing game, then the save points are basically the MP and the quickhacks are the spells.

  • A quick hack that doesn't cost any storage space is the Breach Protocol. Instead, you have to complete a minigame to hack into a network. This allows you to activate various hacks called "daemons".

What daemons are there?

The terminology is a bit confusing, but in principle you also activate hacks via the Breach protocol, only you don't have to spend any storage space, you have to master a mini game. Codes are displayed on the right that you have to enter in order to load the hacks or daemons into the network. At the beginning you only have one daemon, you have to activate the remaining daemons with advantage points with the attribute "Intelligence (advantage: Breach protocol") . You can activate the following daemons - if activated:

  • ICEbreaker : Reduces the storage costs of all quickhacks by 1.

  • Big sleep : All cameras in the network are switched off for 3 minutes.

  • Mass vulnerability : The physical resistance of all opponents in the network is reduced by 30% for 3 minutes.

  • Turret shutdown : All security turrets in the network are turned off for 3 minutes.

This is how the Breach Protocol minigame works

Now that you have hopefully understood the difference between Quickhacks and Daemons, we want to explain exactly how the Breach Minigame works. You will also have to solve it every now and then on quests so that you should internalize it - and it is really simple!

  • The daemons are listed on the right. First, think about which daemon effect you would like to trigger.

  • Have you made up your mind, you have to try to enter the corresponding code in the buffer that is displayed above. At the beginning of your adventure you will receive a cyberdeck with a buffer of 4 characters.

  • On the left side you can see the code matrix. Here you have to choose the right characters and add them to the buffer in the correct order.

  • You are not allowed to choose the characters freely, you have to alternate between characters in a row and column . At first you have to choose a character from the first row. The character you have selected determines from which column you can then choose a character, etc.

  • So you always have to plan one step ahead. Before you confirm the entry, see whether the next required character is available in the column / row.

  • The sequence does not have to start correctly immediately . Has your buffer z. B. Space for 4 characters, the first selected character may be wrong. If characters 2 and 3 e.g. B. form the correct sequence, you have also solved the minigame.

  • This also makes it possible to load several daemons into the network. If you are clever, you will manage to activate two or even three correct sequences at the same time.

Hacking minigame explained using an example

In order to clarify our explanations above, we show you below a concrete example of what you have to do with the Breach mini-game.

  • We'll first look at the three daemon sequences to discover similarities in the code . So have z. B. "EISbrecher" and "Camera shutdown" diagonally "E9" as a common symbol. These two daemons can therefore easily be activated at the same time.

  • Since the sequences are entered from left to right, we must first search for “1C” in order to start the sequence for “camera shutdown”. We therefore choose the second character in the first row (the fifth character would also be possible).

  • Now we need “E9” to complete the “camera shutdown” code and start the “ICE breaker” sequence. Since we are now in the second column, we decide on the fourth character.

  • Finally, only “55” is missing to complete ICE breaker. Since we are in the fourth row, we can choose the first or the fifth character.

Simplify the Breach Protocol mini-game

Once understood, the Hackinig minigame is relatively easy, but of course the level of difficulty varies. If you want to reduce the challenge, you have to invest advantage points in "intelligence (advantage: breach protocol") or get better cyberware. You can influence the aspects based on the level of difficulty:

  • Breach Duration : Increases the time you have to master the mini-game.

  • Buffer Capacity : It is possible to increase the buffer capacity if you buy better Cyberdecks. If you can enter more characters, it will be easier to activate multiple daemons.

  • Length of the data sequence : If you level the "Breach Protocol", you can reduce the characters required for daemon sequences. This helps enormously in successfully completing the mini-game and loading several daemons into the network.

Post a Comment