KIGGU Pro – VA – Vulnerability Assessment

Deep, advanced vulnerability recognition with the highest quality.


KIGGU Pro – VA – Vulnerability Assessment

Our Vulnerability Assessment service leverages the MITRE ATT&CK® methodology to identify weaknesses in your IT infrastructure. The process begins with a recognition phase, followed by a scanning phase, and concludes with an analysis of the results.

This intermediate complexity service provides a dashboard for result previews, offering a deep, advanced, and high-quality vulnerability recognition.


Uncover Your Vulnerabilities in Four Phases


Configure your Vulnerability Assessment to fit your needs.


We identify information and research assets.


We conduct port and service scanning, vulnerability scanning, and analysis.


Receive comprehensive reports and evidence of each technique used.



We use the OWASP, OSSTMM, NIST, MITRE ATT&CK®, and OFFSEC methodologies in our Ethical Hacking service.

Our team holds a variety of certifications:

  •       Certified Information Systems Security Professional (CISSP) 
  •       GIAC Security Essentials Certification (GSEC)
  •       GIAC Certified Incident Handler (GCIH)
  •       GIAC Penetration Tester (GPEN)
  •       Offensive Security Certified Professional (OSCP)
  •       Offensive Security Wireless Professional (OSWP)
  •       Offensive Security Certified Expert (OSCE)
  •       Offensive Security Exploitation Expert (OSEE)
  •       Licensed Penetration Tester (LPT)
  •       Certified Ethical Hacker (CEH)

We recommend running this service on the CRITICAL IT and communications infrastructure of an organization.

We can evaluate both LAN – Local Area Network (INTERNAL) and WAN – Wide Area Network (INTERNET).

You will receive a consolidated report in EXCEL format with technical details of the vulnerabilities. You can also generate differential reports between one scan and another. Our platform generates reports that are aligned under international compliance regulations such as ISO, NIST, HIPPA, PCI DSS, and SOX.

KIGGU PRO Currently supports the following technologies list:


  • AIX Local Security Checks
  • Alma Linux Local Security Checks
  • Amazon Linux Local Security Checks
  • Backdoors
  • Brute force attacks
  • CGI abuses
  • CGI abuses : XSS
  • CentOS Local Security Checks
  • DNS
  • Databases
  • Debian Local Security Checks
  • Default Unix Accounts
  • Denial of Service
  • F5 Networks Local Security Checks
  • FTP
  • Fedora Local Security Checks
  • Firewalls
  • FreeBSD Local Security Checks
  • Gain a shell remotely
  • General
  • Gentoo Local Security Checks
  • HP-UX Local Security Checks
  • Huawei Local Security Checks
  • Junos Local Security Checks
  • MacOS X Local Security Checks
  • Mandriva Local Security Checks
  • MarinerOS Local Security Checks
  • Misc.
  • Mobile Devices
  • Netware
  • NewStart CGSL Local Security Checks
  • Oracle Linux Local Security Checks
  • OracleVM Local Security Checks
  • Palo Alto Local Security Checks
  • Peer-To-Peer File Sharing
  • PhotonOS Local Security Checks
  • Policy Compliance
  • Port scanners
  • RPC
  • Red Hat Local Security Checks
  • Rocky Linux Local Security Checks
  • SMTP problems
  • SNMP
  • Scientific Linux Local Security Checks
  • Service detection
  • Settings
  • Slackware Local Security Checks
  • Solaris Local Security Checks
  • SuSE Local Security Checks
  • Ubuntu Local Security Checks
  • VMware ESX Local Security Checks
  • Virtuozzo Local Security Checks
  • Web Servers
  • Windows
  • Windows Microsoft Bulletins
  • Windows User management


We are here for you, do not hesitate to contact us


Explore the Range of Our Services

KIGGU Consultant – Penetration test pci dss & compliance

Comprehensive penetration testing aligned with major compliance standards for robust security assessment.

KIGGU Consultant – Ethical hacking

Advanced ethical hacking using MITRE ATT&CK® to identify and exploit potential vulnerabilities.

KIGGU Consultant – Red team

Next-gen cybernetic tests with a team attacking the organization permanently to find any weaknesses.