Cyberhack_V10.hex (78.7 KB)
The corrupted Corpo has to be stopped and your hacking skills will be invaluable.
Hack your way through some of their perimeter servers to earn enough money to buy a CyberDeck which, in turn, will allow you to hack more important servers for even more money. With each CyberDeck purchase, you will progress to the servers holding the inner secrets of the corporation. Complete all available hacks to take down the corporation and make as much money as possible – after all, your actions are not entirely altruistic!
Travel from the safety of your home to the business district to buy CyberDecks as you can afford them or when you have completed all available hacks that your current CyberDeck allows you to access. There are three CyberDecks available and upgrading from one to the next increases the size of the hacking grid, the number of available hacks and the buffer size allowing you to earn more money from a single hack.
But be careful when travelling between locations as you may be spotted by the corporation’s guards which will increase your threat level. Use obstacles in the street to hide behind or hack a building door to reveal a hiding place. Lamp posts can also be hacked which will distract the guards allowing you to run past them.
You can visit the slums to pay for your threat level to be lowered. However, as each CyberDeck only exposes a certain number of hacks, you will need to ensure that you raise the maximum amount of money possible per hack and minimise spending that money to lower your threat level. If you do not earn enough money or spend too much, you may not be able to afford to upgrade your CyberDeck and you will have failed your mission.
Expand the various topics below to learn how to play the game.
You can travel between the Commercial District, the Slums District and your Safe House using the directions on the gamepad. Press the A button to reveal the menu of options available to you.
How to Hack
You are a skilled netrunner and are adept at injecting malicious code into the unprotected buffers of servers.
When hacking a server, you will be presented with a number of hacks that you can install. The more hacks you install and the longer those hacks are, the more money you will earn.
To install a hack, enter its code into the server’s buffer via your terminal. The buffer length will ultimately determine how many hacks you can enter and the purchase of advanced CyberDecks will increase the buffer size for you. However, you can maximise the number of hacks installed by overlapping common codes from the one to the other.
Let’s play a simple example:
The first thing to note is the buffer size which in this case is 6 characters wide.
Looking at the hacks, you may notice that there are common strings of characters at the end of some hacks which overlap with the start of some of the others. In the example above, these hacks can be logically rearranged as shown below. Arranging them this way allows you enter the codes
3F E7 16 06 06 into the buffer and install all the hacks. In this particular hack, only five of the six buffer positions are required to complete the hack completely.
However, not all hacks can be solved this easily. In the example below, it is not possible to arrange the hacks so that all can be achieved.
Rearranging the top four hacks happens to provide a sequence that fits into the provided buffer however it does not use all of the available hacks. This happens some times!
When presented with a puzzle like that above, you should look at solving as many hacks as possible. Additional money is awarded for longer hacks so always consider those first.
To help you visualise the hacks, you can press the ‘B’ button to enter a mode where you can scroll through the elements of each hack on the right-hand side of the screen and have corresponding cells highlighted on the left.
Once you have determined which hacks you are planning to complete. You can start the actual attack itself.
Hacks are entered by selecting an element from the highlighted row, followed by an element from the selected column, followed by an element from the selected row and so on until all hacks are complete or unable to be completed or your buffer is full. You are also racing against the clock – your window for entering the hacks will be shut when the time runs out.
Let’s start entering the hacks. In our example, we are planning to enter codes
3F E7 16 06 06 to complete all hacks. When the hack begins, you can only scroll horizontally on the first row.
3F from the top row adds it to the buffer shown at the bottom of the screen and changes the selection mode to allow column selection. You will notice that the
3F on the hack in the right-hand side is also highlighted – showing that this hack is in progress. The
3F in the top row of the grid also has a small check mark beside it to show that it has been selected previously and cannot be re-used.
Scrolling down and selecting the
E7 again adds it to the buffer. This time the
E7 is highlighted in the hack we had previously started and at the start of a new hack – we are currently completing two separate hacks simultaneously as the characters overlap. The selection mode has also switched back to row again.
16 further completes the two active hacks and starts another.
Selecting the two
06 characters in the bottom-right and bottom-left of the grid completes all of the hacks and the hack is completed!
In more complex puzzles, some of the hacks will be marked as failed as you install other ones as there is simply not enough room to left in the buffer to accommodate them.
The time you have to complete a hack is dictated by the complexity of the puzzle and the CyberDeck you are using. If you run out of time, only those hacks you have installed will be rewarded.
Hacking for Money
You need to make money from your hacks in order to proceed. As mentioned earlier, longer hacks earn more money than shorter ones and you will need to balance the completion of hacks against each other.
Hacks of 2 characters earn $3.
Hacks of 3 characters earn $8.
Hacks of 4 characters earn $15.
Hacks of 5 characters earn $30.
Furthermore, each breach attempt has a target amount - shown in the top right corner which you must achieve for the hack to be successful. Failing a breach attempt will cause your threat level to go up.
In the example hack below, the target is $24. The value of each hack is also listed and you can see that various combinations of individual hacks will get you to your target. Attempting the first, third and fourth hack will earn $3 + $8 + 15 = $26 and complete a successful hack. Completing the fifth hack alone will earn $30.
Moving between Areas
When moving between locationsyou may be spotted by the corporation’s guards which will increase your threat level. Use obstacles in the street to hide behind or hack a building door to reveal a hiding place. Lamp posts can also be hacked which will distract the guards allowing you to run past them.
You start at the left hand side of the world and must progress to the right hand side - not a simple feat! You can hide behind obstacles in the street by positioning yourself immediately adjacent to it and pressing the ‘Down’ button. You will crouch down and will be out of view of the guards.
Lamps can be hacked by pressing the ‘A’ button to reveal your reticle. Move the reticle between the building doorways and lamps to select the one to hack. Press ‘A’ a second time to activate the hack.
Any guard on the screen will be stunned for a number of seconds, giving you time to slip past.
Building doors can also be hacked by revealing the reticle - using the ‘A’ button and selecting the door.
Once open, you can hide in the doorway by moving to it and pressing the ‘Up’ button to hide. Guards inthe area will simply walk past you … but be careful as the doors close after a while, dumping you back into the street and in plain view of the guards!
If you get caught in the guard’s torch beam, he will become alerted to your presence and will start following you. Your health will decrease (as indicated in the top left hand corner) and, if caught, your threat level will be increased.
Compiling / Reflashing
This game was compiled using @Mr.Blinky’s optiimised core and has the USB stack removed to save memory. Due to its size it cannot be compiled using the standard library. When reflashing new games over the top of this game, press and hold the ‘Up’ and ‘Down’ buttons simultaneously for a few seconds from any screen to revert to the bootloader.