If you are a member of a security penetration testing team, and you identify vulnerabilities and exploits, what should you obtain from the owners of the system in question prior to compromising and exploiting the known vulnerability?