Step 1: Lockstep, Step 2: HACK ATTACK