Hacker entry full diagram illustration part1