Processes Involved in Hacking