Hacking phases

For a hacking attack to succeed, the operation must follow a set of phases.