This document provides an introduction to hacker culture and methodology. It discusses the different types of hackers, including their motives and levels of knowledge. It outlines the basic phases of a hacker's methodology, including information gathering, scanning, gaining access, privilege escalation, exploiting vulnerabilities, and installing backdoors. The document also summarizes two cyberwar stories, GhostNet and its targeting of computers in 103 countries, including the office of the Dalai Lama, and China's denial of involvement in the espionage ring. In conclusion, it stresses understanding hackers and their techniques in order to better defend against attacks.