Hacker Methodologies for Security Professionals