There is a dark corner of the Internet where hackers sell their software. The process unfolds in three steps.