Why? What? How? First I check for the loose ends, and then where I start and what I do depends on case to case. For example, broken authentication or the most favorite XSS attacks and single form can allow the hacker to get to your database or the server files. If you have any questions or problems or any hack attempt, you can send me a personal message.