guides
Last update:07 January 2021
Hacking is one of the main skills in Cyberpunk 2077.
With it, you’re free to open locked doors, manipulate opponents, cars or cameras.
Mini-Hacker game - Breach Protocol
Hacking is presented as a short mini-game.
Its duration will depend on the situation and what you want to hack.
Let’s start with a simple explanation of the mechanics.
Breach Protocol is a short mini-game, which requires a thorough analysis and clicking the relevant elements.
The sequences correspond to a hacking program -a daemon.
The second thing, this mini-game resembles sudoku.Your next selected number must be in the same row or column.
Otherwise you will not be able to activate it.
It is up to you which column you activate.
The third thing to remember.The first move is most important.
It is up to it which next column will be activated.
Buffers are located on the right side, at the top.
We marked it on the screen above.
Fifth thing, you could highlight thesymbols you are interested in on the matrix.
All you have to do is hover the daemons, and they will show up on the matrix.
This can make your task easier.
Look right at thedaemonsthat are most important in this situation.
These are the elements that you have to mark.
Look up on thebuffer.
This is the number of chances you have.
Let’s go tothe code’s matrix.
The first symbol isBD.
On the matrix it’s possible for you to find as many as4.
However, you must choose one that will lead you to the1Csymbols.
It’s the second point you have to mark.
Remember, however, that you have to move from 1C to the next1C.
Your task is to find such aBDsymbol, which is in the same column as1C.
In this case, the second and third column will work well.
In the second column you have three1Csymbols.

Take a close look at the rows they are in.
Find one in which there is another1Cto complete the task.
In this case, each of the three rows will work perfectly.
you’re able to see on the screen above how easy it is to find the matching elements.
After starting all the daemons, you will finish the mini-game successfully.
Hacking - how does it work?
Hacking requires composure and calm.
It is best if you venture to move quietly so as not to be detected.
If you want to learn more about stealth, just visit theStealth and quiet combatpage.
If you want to hack something, scan your surroundings first.
Available objects will be highlighted.
Development of hacking
The development of hacking depends on many factors.
They are affected by many variables that may limit you, such as RAM.
In the game you could hack different objects and characters.
Remember that your hacking depends on the attributes you develop and your experience level.
Some things can only be performed after unlocking a certain ability.
RAM and hacking
RAM memory is a resource used during combat hacking.
Each combat hacking of an enemy or object takes a certain amount of RAM.
The cost of RAM lost during quockhacking can be adjusted by gaining new abilities and levels.
You increase the maximum amount of RAM by purchasing new attributes for intelligence and cyber software.
Additionally, it is worth remembering that you recover RAM if you do not take part in a fight.
Quickhacking
Quickhacking is a list of actions you’re able to perform on a given object/enemy.
They appear after a equipment or a character is highlighted on the scanner.
This list is not always the same.
A lot depends on the object you are trying to hack.
Quickhacks - how to get new ones?
This site is not associated with and/or endorsed by the CD Projekt RED or CD Projekt RED.
All logos and images are copyrighted by their respective owners.