Techniques used by the hacker | cybersecurity awareness