This document discusses the current state of "hacking back" in response to cyber attacks. It defines hacking back as active countermeasures that aim to limit an adversary's capabilities and/or identify the intruder. The document explores some motivations for hacking back such as neutralizing threats, characterizing attacks, and deterring hackers. It examines examples of hacking back throughout history from early cases in the 1980s to more recent operations. It also discusses some limits and challenges of hacking back related to technical issues, legal concerns, ethics, and collateral damage.