Black Ops 6 Players Uncover Hidden Flank Routes Beyond the Map

Black Ops 6 Players Uncover Hidden Flank Routes Beyond the Map

If gamers aim to catch their opponents unaware on the maps Stakeout and Protocol, there are two hidden paths they might not anticipate.

Pro players Dashy and Shotzzy expressed their disdain for the current map selection, labeling it as “poor quality.”

For those who are dissatisfied with the existing map roster, there is good news: the beloved BO2 map Nuketown is making a comeback this Friday, along with the highly anticipated Season 1. Treyarch is also taking steps to fine-tune maps for an enhanced gameplay experience.

On October 26, a small patch was released to fix various map exploits that allowed players to escape the designated play areas in Babylon, Lowtown, and Red Card. Nevertheless, some remaining exploits might still exist.

CharlieIntel revealed outside flank routes for the maps Stakeout and Protocol.

To execute the Stakeout route, players should ascend the stairs and leap down to the central rooftop area. For the Protocol strategy, drop beneath the helicopter platform and traverse along the edge of the map to access the enemy spawn easily.

To amplify the effectiveness of these tactics, it’s advisable to equip Ninja in the Perk 1 slot for quieter footsteps. Additionally, activating Double Time in Perk 3 will boost Tactical Sprint duration, making it easier to swiftly navigate behind opponents.

Moreover, players no longer need to select a knife as a secondary weapon, thanks to a dedicated melee function in BO6. However, carrying a knife while flanking is beneficial as it enhances movement speed significantly.

On PC, players can equip a knife by pressing and holding the V key. For console users, hold the melee button, which is B on Xbox, Circle on PlayStation, or RS on Xbox and R3 on PlayStation if following a different control scheme.

It’s crucial for players to capitalize on these strategies while they last, as Treyarch may choose to eliminate these routes similar to past exploits.

Source

Leave a Reply

Your email address will not be published. Required fields are marked *