The document outlines the top 10 common hacking techniques used by hackers. These include keyloggers that record keyboard strokes, denial of service (DoS/DDoS) attacks that flood sites with traffic to crash servers, waterhole attacks that target popular locations to infect victims, and faking wireless access points to intercept user data. Other techniques are eavesdropping to passively obtain information, phishing using spoofed websites, spreading viruses and trojans to steal data, clickjacking to hijack clicks, cookie theft to access user accounts, and bait and switch using malicious ads.