Here are ten methods that hackers may use

Phishing

Malware Attack

Social Engineering

Password Attack

Man-in-the-Middle (MitM) Attack

Cross-Site Scripting (XSS)

SQL Injection

Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attack

Zero-Day Exploit

Physical Attack