preloader

Explain what are the types of the hacking stages?