Which of the following describes an instance of legal hacking?



Grey hat hacking


Penetration testing for a company to check for vulnerabilities in their network security.


Looking for security risks on a product that is excluded from a bug bounty program


Security hacking is never legal