Skip to main content

How to hack in Cyberpunk 2077

The way you build your character in Cyberpunk 2077 determines a lot about how you interact with the world. You can choose to focus on being a run-and-gun style killer who bursts into a room full of enemies guns blazing, or go the sneaky route and complete your missions without taking a single life. Hacking is a skill you will want to learn early on no matter how you want to play. It opens up a ton of options, as well as being one of the most lucrative and quick ways to earn some Eurodollars in Night City. Don’t worry if you’re not a computer wizard in real life. Hacking in Cyberpunk 2077 isn’t as complex as that, but it does still have some intricacies you’d do well to learn before loading up your first Breach Protocol. Here’s our full diagnostic on how to hack in Cyberpunk 2077.

Further reading

Hacking 101

Cyberpunk 2077 Cyberdeck
Image used with permission by copyright holder

Hacking in Cyberpunk 2077 can be broken down into two categories: Quickhacking and Breach Protocols. These each function differently, but do share a few similarities. First is that scanning is your best friend. Anything in the world that you can hack will show up with a quick scan of the environment. You’ll see doors, cameras, access points, and even people that you can hack for different effects that will make your life easier. Similar to the detective vision in other games, this is a tool you’ll want to be using at all times to get the best view of the situation.

Recommended Videos

Quickhacking can be done after scanning a hackable object or enemy and is limited by your character’s RAM. You can, and should, upgrade this at Ripperdocs so you can give yourself the biggest edge in any situation before anything goes sideways.

Breach Protocols are done to hack into access points. These can be things like antennas and laptops and have a mini-game associated with them. This makes them more difficult than a Quickhack, but success will give you much better rewards.

How Quickhacking works

Cyberpunk 2077 Quickhack
Image used with permission by copyright holder

Quickhacking will require you to have a Cyberdeck installed. The better the Cyberdeck, the more RAM you get to perform even more hacks. Quickhacks are primarily good for distraction purposes. After scanning an area you’ll have the option to take control of the security camera systems, distract guards, and even screw with any Cyberware they have. Some hacks can be lethal, so consider what you want to that unsuspecting guard if you’re trying to stay non-lethal.

Your hacking options for whatever you’re targeting will be listed on the left side of the screen, as well as the required RAM to perform that hack. Any options highlighted in red can’t be done either due to lack of remaining RAM or if that option has already been done. If you don’t know what one of the Quickhack options means, you can see a description by tabbing over to the Hacking menu on the right side for a full list. The right side of the screen will also show you relevant data to your hacking target. You can see, for example, what type of character they are, what group they’re affiliated with, a list of abilities, and what they are weak to.

Once you pick your target and hack of choice, just select it and watch the results.

How Breach Protocols work

Cyberpunk 2077 Breach Protocol
Image used with permission by copyright holder

This is the “real” hacking in Cyberpunk 2077. You will need a high enough intelligence level to even attempt this type of hack on certain Access Points, as well as get physically close enough to jack into the device. The upside to this type of hacking is that any hack you do on an Access Point will impact all the enemies in an area rather than a single target like Quickhacking. You can spot an Access Point when scanning by looking for the little network icon in the area. You can also unlock a Ping Quickhack to find the Access Point if you use it on a person or object connected to the network.

Once you find an Access Point, with a high enough level of intelligence to hack it, you will plug yourself in and start the mini-game. This screen can look quite overwhelming at first, but once you know what you’re looking at, becomes a lot more manageable. You have your time limit at the top left, the Code Matrix right below that, a Buffer meter on the upper right, and the different sequences you’re trying to match, plus their effects, on the right. You can, and should, fill in multiple sequences at once to trigger multiple rewards.

Now, on to the hacking itself. What you’re attempting to do is match the code found on the sequences on the right from left to right. However, you can only choose codes in an alternating order of rows and columns in the Code Matrix. For example, if you pick the top right option in the matrix, in this case, 8D, the next option you can pick can only be in the far right column. In the image above, that would lock me out of the bottom sequence because the only codes available in that right column are 8D and 55 while that sequence would need 1C. That means you need to plan ahead to know which code you should pick to make sure you have the option for the next one in the sequence in the following row or column.

Every code you pick will take up one of the slots in the Buffer section. You will only have that many codes to select before either completing one or more sequences or the hack will fail. This is another upgrade option available from Ripperdocs you should invest in.

One thing that can make Breach Protocols a little easier is to take a second to highlight the sequence you’re going for on the right. This will highlight all the codes in the matrix that fit the sequence so you can quickly plot out what order to select the codes in. Also, if things are going poorly, you can always back out of a Breach Protocol and start over from scratch, only with less time on the clock. Just be aware that all Breach Protocols are randomized each time so you can’t completely cheese the system this way.

Topics
Jesse Lennox
Jesse Lennox has been a writer at Digital Trends for over four years and has no plans of stopping. He covers all things…
The best Power Armor in Fallout 4 and where to find each set
Fallout 4 key art featuring the power armor suit hung up in an armory.

From the very first Fallout game, the Power Armor has been every wastelander's dream to pilot. This hulking suit of armor can make your normally squishy Vault Dweller nigh unkillable in Fallout 4. But there's more than just one type of Power Armor, and each one has different stats and requirements to wear. Not only that, but some you might find one piece at a time and need to build yourself, while others can be found as a complete set. If you want to make even a Deathclaw think twice about attacking you, only the best Power Armor will do. Here are the best suits in Fallout 4 and where to find them.
Raider Power Armor

This is the only Power Armor in Fallout 4 that even a base-level player can wear right off the bat. While that's great, it does mean it's the weakest option out there. The best stats you can get with it are 500 damage resistance, 250 energy resistance, and 1,050 radiation resistance for a total rating of 1,800. It's great for the early game if you can snag one, but is quickly outclassed by everything else on this list. A guaranteed spawn for this armor is in the cave right beside Skylanes Flight 1665 on your map.
T-45 Power Armor

Read more
How to hack in Fallout 4
A computer terminal in Fallout 4.

No matter what perks or skills your character has in Fallout 4, hacking will always come down to your ability as a player. There's no way to cheat the system here, and if you don't grasp what the game is asking you to do, you're mostly out of luck. Terminals will hide great loot behind their cryptic puzzles, as well as allow you to take over certain controls to turn your enemy's security against them. Some have very interesting logs about certain characters or events for all you lore junkies out there. Hacking has tons of uses, so let's brush up on your computer skills and give you a refresher on how to hack in Fallout 4.
How to hack in Fallout 4
When you first interact with a terminal to hack in Fallout 4, it will be a little overwhelming. As long as you have a high enough hacking skill to attempt a hack, you can go right into the minigame.

The basic idea of hacking is to find words hidden in that jumble of letters and symbols. Your goal is to find the correct word to crack the terminal before you run out of attempts. Once you find any word and select it, the terminal will tell you how close that word is to the correct one based on how many letters it has in the same space as the answer in the form of a likeness rating. The higher the rating, the more letters it has in common. It is somewhat similar to Wordle, only you don't type in the words yourself.

Read more
All Teddy Bear locations in Fallout 76
A teddy bear in a train station in Fallout 76.

There's no shame in admitting that you enjoy the company of a teddy bear in Fallout 76 over the ghouls and mutants. In fact, we would probably prefer spending time finding these cuddly bears than playing with the other players, but these stuffed animals are a rare commodity in the wasteland. Technically, these are classified as a junk item that you can break down for materials, but who would do something like that? These are great display items to make your camp feel more like home, or just another annoying daily task you need to complete. Whatever your motivations are, here is where you can find each of the different teddy bear variations in Fallout 76.
All teddy bear locations
There are 12 different variations of teddy bears that all have a distinct color pattern, name, and value, but are otherwise identical. Like most items, they can be found in a ton of places around the map, but these are the easiest spots to get the one you're looking for.
Bubblegum Bear

Our first bear is going to be inside the Foundation. Once inside, go to Ward's trailer and pick it up off the couch.
Camden Park Bears

Read more