The document discusses different types of hackers and hacking techniques. It describes script kiddies, professional criminals, virus writers and their motives. It then explains various web application hacks like file query, SQL injection, and cross-site scripting. The document also discusses ethical hacking and how organizations use ethical hackers to evaluate security vulnerabilities by attempting to break into systems. Ethical hackers possess strong programming and networking skills along with knowledge of operating systems, hardware, protocols and project management. Their evaluations seek to determine what an attacker can access and how they may go undetected.