- Quickhacking – This is the hacking you do with your scanner on enemies and electrical objects. The number of actions you can perform depends on the cost of Quickhack and the amount of RAM you have. RAM is determined by V’s operating system, which you can upgrade in a Ripperdoc.
- Hacking Access Points with Violation Protocol – Access points are laptops, antennas or other places where V can plug in and play the Breach protocol hacking mini-game. If you enter the code in the correct order, you can unlock more than one Datamine sequence for better rewards. The AP Breach Protocol is generally a more difficult version of the Breach Protocol than the Quickhack version used on enemies and random tech.
Now let’s get into the deep dives.
As stated above, Quickhacking is the action you do with your scanner to use a demon, or hack on an electric object or selected enemy. V should scan the item or person, and if they can be hacked, you will see two menus to navigate in the scanner.
With your base scanner and its perks, you’ll see this for normal items and civilians:
If you scan an object connected to an enemy network or to the enemy itself, you will get the Hacking tab in addition to the data:
The elements of Quickhacking
Quick hacking has four main elements: target, available quick hacks, RAM, and the hacking information panel.
1. The target: This one is pretty obvious, but your target is changing the available Quickhacks. For example, if you hack a device, you can’t burn its synapses because, you know, it doesn’t have eyes. You will have the most options on human targets.
2. Quickhacks available: Again, the Quickhacks available depend on your target. If a Quickhack is stuck in red, it means it’s already in use or you don’t have enough RAM to use it.
3. Cyberdeck RAM: The RAM allocated to V depends on its operating system, which you can upgrade in a Ripperdoc. This can be found in the Cyberdeck section of the menu. The operating system also determines how many Quickhacks you can have equipped and what kind of things you can hack.
4. Data and hacking : Note that you can get important information from the Data tab about your enemy. This includes their specialization (are they an ordinary jerk or are they a Netrunner?), Their affiliation, whether or not they have a bounty and whether you will get Street Cred for taking them out, and their strengths and weaknesses. This can be extremely important when facing a boss. The hacking tab gives descriptions for the Quickhack you have selected.
Are you getting an overheating error? Find out why on the How to stop overheating guide.
How to get more RAM
To get more RAM you will need to register your Eurodollars and visit a Ripperdoc. Next, select the Operating System section to see what the Ripperdoc has to offer (you can also consult the List of Ripperdoc locations and capabilities). Ripperdocs don’t have the same stock, so it’s worth considering your options before buying.
We recommend that your first upgrade be at least a rare operating system rather than an unusual system.
How to get more Quickhacks
The easiest way to get new Quickhack options is to buy them from a Netrunner. They run stores like any other merchant and each will sell different Quickhack daemons.
You can also create your own Quickhacks. Some Quickhacks and Quickhack upgrades can be obtained through Benefits of Intelligence.
It wouldn’t be an IGN without some advice! Here are a few things to keep in mind when Quickhacking:
- Make it a rule to always start a Breach Protocol encounter, even if you don’t plan on using stealth for a long time. This will reduce the cost of a RAM Quickhacks.
- If you are using Ping, you can find the access point in the area if there is one. All connected devices will ping the Access Point device as indicated by the number lines.
- Although time passes slowly as you scan and hack, time has not completely stopped. Be aware of V’s position so that they are not spotted.
- Make the security cameras work for you! V can hack enemies through security cameras under their control.
Hacking access points
Unlike Quickhacking, connecting to an access point requires V to have a certain level of intelligence and has what is usually a slightly more difficult version of the breach protocol.
How to find access points
Access points can be things like laptops, consoles on a wall, and an antenna in enemy areas. You can find them with your scanner and they will be marked with a small version of this icon:
And here is an example of one on an antenna:
Besides scanning and looking around for this marker, you can use Quickhacks and even perks to find them faster.
The Ping Quickhack (which you can get for free Gift) works on any device connected to the access point and reveals the location of the access point (and connected devices and people on the network) through lines like this:
However, not all areas with enemies have access points, so if you are having trouble finding where the lines meet, it may be because there is not an access point in the area.
If you want to free up a Quickhack space for something else, you can invest in the Perk Protocol Perk called Extended Network Interface. This automatically highlights nearby access points.
You can sometimes spot hotspots in random locations around Night City.
When you get to an access point, V may be given the option to plug in. The option is determined by the intelligence level of V. If you are level enough to log in, you will see a Breach Protocol hack mini-game screen that looks like this:
The goal is to capture one or more of the sequences required to “dataminate” this access point for rewards. The pattern for entering the code in a sequence begins with the first line. Then the next code you can select will be in the column of the first code. the pattern repeat row – column – row – column-etc in the direction you choose.
If you have a larger buffer size (which can be increased by upgrading the operating system from V in a Ripperdoc) you can enter more codes. Your goal should be to erase at least two sequences. Each of the three sequences and the code matrix are randomized. Hopefully, you might even be able to complete all three, though two should always be your goal.
If one sequence fails while you are entering another sequence, it means that depending on your entry, it was no longer possible to enter the other.
Point: If you hover over any of the code units in the sequences on the right, all the corresponding code in Cody Matrix will be highlighted. It’s a simple way to see your row and column options for that particular code.
Let’s use the above violation protocol as an example. Based on my options and the size of the buffer, I decided to try and resolve Datamine 3, Datamine 1, then Datamine 2. The resulting violation sequence would be BD – BD – 55 – 1C – E9 -BD .
Point: You don’t like the sequences you have? Step out of the hotspot and you’ll ride a new set of sequences and a new code matrix! This only works if you haven’t already solved one of the sequences and it will reduce your breach time.
Keep in mind that there can be multiple ways to enter sequences in a single violation. And don’t forget that you are timed! The timer only starts when you engage with the code matrix.
Point: To make a mistake? You can exit the Breach Protocol console and start over. This only works if you haven’t already erased a sequence and it will reduce your breach time.
Once you have understood everything about your code, you can go back and you will see your rewards appear on the left side of the screen.
The rewards obtained through access points can be increased through perks such as Advanced data analysis (Upgrades Datamine, increasing the number of Eurodollars acquired at access points by 50%). Advanced Datamine can be upgraded again for a huge 100% increase. With that, we were able to get well over $ 1000 per access point if he drops the cash reward. They usually do.
You can see all the associated benefits on our Benefits of Intelligence page.