This document provides an overview of hacking, including its history and common techniques. It begins with early "phone freaks" who experimented with hacking phone systems using blue boxes and Captain Crunch whistles. It then outlines the stages of a typical penetration test: reconnaissance, scanning/enumeration, gaining access, privilege escalation, maintaining access covertly, and covering tracks. Common hacking methods like password cracking, man-in-the-middle attacks, Trojans, and keyloggers are also summarized. The document concludes by noting that nothing is truly secure and that risk is a balance of attack cost and information value.