The 5 Phases of Hacking