preloader

What are the steps performed by Hackers to hack a System or Network?