diff --git a/xml/source/snippets/offerte/en/methodology.xml b/xml/source/snippets/offerte/en/methodology.xml index 7a26cc2..eacdfb1 100644 --- a/xml/source/snippets/offerte/en/methodology.xml +++ b/xml/source/snippets/offerte/en/methodology.xml @@ -43,7 +43,7 @@ Potential threats and vulnerabilities are indexed, based upon the collected info
Step 6: Exploitation
Attempt to use vulnerabilities of the various components.
The diverse applications and components of the client's infrastructure are
-relentlessly probed for frequently occurring design, configuration, and
+rigorously probed for frequently occurring design, configuration, and
programming errors.
Note:
- Our fixed-fee price quote for the above described penetration
- testing services is