Phases of Hacking