How White Hat Hackers Attack