using tag instead of hardcoded reference to pentesting.
This commit is contained in:
parent
43cf34aa25
commit
00304b9e4f
@ -43,7 +43,7 @@ Potential threats and vulnerabilities are indexed, based upon the collected info
|
||||
<p><b>Step 6: Exploitation</b><br/>
|
||||
Attempt to use vulnerabilities of the various components.
|
||||
The diverse applications and components of the client's infrastructure are
|
||||
relentlessly probed for frequently occurring design, configuration, and
|
||||
rigorously probed for frequently occurring design, configuration, and
|
||||
programming errors.</p>
|
||||
|
||||
<p>Note: <company_long/> uses open-source scanning tools to get its bearings,
|
||||
|
||||
@ -8,8 +8,7 @@
|
||||
</ul>
|
||||
|
||||
<!-- snippet --><p>
|
||||
Our fixed-fee price quote for the above described penetration
|
||||
testing services is <p_fee/>.- excl. VAT and out-of-pocket expenses.
|
||||
Our fixed-fee price quote for the above described <company_svc_short/> is <p_fee/>.- excl. VAT and out-of-pocket expenses.
|
||||
<company_short/> will send an invoice after completion of this assignment.
|
||||
<client_short/> will pay the agreed amount within 30 days of the invoice date.
|
||||
</p>
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user