As white-hat hackers, we're hacking in the legal zone, which is why we also need to follow a basic set of steps.
In what order would we perform a white-hat hack?
Sweet! If we follow these steps, we'll be true white hats.
Shouldn't we get permission before we can hack it?