This question doesnt really make sense. A hack is generally defined as using an exploit to access data you generally shouldnt have access to. To "hack the hack" it would be done by exploiting a flaw in the method they use to take advantage of their work.
This would depend on the person you are trying to hack but most likely you would need to first track their location using an ISP lock program or trojan. I would warn that most states have anti-hacking laws and pursuing this may be illegal.