A Guide to How Hackers Hack