rules of engagement in hacking