The document introduces hacking and provides context. It defines hacking as unauthorized access to computer systems and networks to bypass security. It discusses the need for ethical hacking to test one's own security. The document gives a brief history of hacking and lists some of the most famous hackers. It also provides an overview of the real hacking process and how to find the latest exploits.