How Hackers implement the Attack