As white-hat hackers, we're hacking in the legal zone, which is why we also need to follow a basic set of steps.

In what order would we perform a white-hat hack?

Get permission from the system's ownerHack the systemTell the owner about the vulnerabilities

Sweet! If we follow these steps, we'll be true white hats.

Shouldn't we get permission before we can hack it?