How Hackers implement the Attack

Task