A. Gray Hats inform organizations after exploitation
B. Black Hats operate with permission
C. Gray Hats exploit vulnerabilities for financial gain
D. Black Hats only find vulnerabilities without exploiting
Explanation:
Gray Hats often find and report vulnerabilities without permission, while Black Hats exploit vulnerabilities illegally for gain.