Step-By-Step Guide for hack recovery