How is this hacking?
He probably used a known password, there is no skill involved here, there is no laborious hours spent analysing a system for weakness inherent to the code, and then constructing a hack to exploit that weakness.
If he used a key, it is not even breaking and entering. It is just unauthorised entry.