Intrusion Detection: Running a Hacker Simulation