Which of the following describes an instance of legal hacking?
Grey hat hacking
Penetration testing for a company to check for vulnerabilities in their network security.
Looking for security risks on a product that is excluded from a bug bounty program
Security hacking is never legal