preloader

What are the various steps performed by the hacker to hack a system?