This was a good walk-through what the hacker focused on and how he accomplished it.