About challenges hacking

This topic has been already addressed in some post of this forum:

I hope this clarify all your doubts