KIGGU Pro – EH – Ethical Hacking

Advanced service for recognizing weaknesses and exploiting vulnerabilities.


KIGGU Pro – EH – Ethical Hacking

Our Ethical Hacking service executes Tactics and Techniques associated with the MITRE ATT&CK® methodology. The process begins with a recognition phase, followed by a scanning phase, and finally, controlled intrusion tests. This advanced complexity service provides a Dashboard to preview the results. If you’re looking to recognize weaknesses in a deep, advanced way and exploit the vulnerabilities found, this service is for you.


Uncover Your Vulnerabilities in Five Phases


Configure your Ethical Hacking parameters to suit your needs.


We identify pertinent information and research your assets.


We conduct comprehensive scanning of ports and services, banner scanning, vulnerability scanning, and analysis.


We execute attacks on assets, offensive techniques, intrusions, exploit execution, and “Password Attacks”


Receive a detailed report from the service.



We use the OWASP, OSSTMM, NIST, MITRE ATT&CK®, and OFFSEC methodologies in our Ethical Hacking service.

Our team holds a variety of certifications:

  •       Certified Information Systems Security Professional (CISSP) 
  •       GIAC Security Essentials Certification (GSEC)
  •       GIAC Certified Incident Handler (GCIH)
  •       GIAC Penetration Tester (GPEN)
  •       Offensive Security Certified Professional (OSCP)
  •       Offensive Security Wireless Professional (OSWP)
  •       Offensive Security Certified Expert (OSCE)
  •       Offensive Security Exploitation Expert (OSEE)
  •       Licensed Penetration Tester (LPT)
  •       Certified Ethical Hacker (CEH)

We recommend running this service on the CRITICAL IT and communications infrastructure of an organization.

We can evaluate both LAN – Local Area Network (INTERNAL) and WAN – Wide Area Network (INTERNET).

You will receive a consolidated report in EXCEL format with technical details of the vulnerabilities. You can also generate differential reports between one scan and another. Our platform generates reports that are aligned under international compliance regulations such as ISO, NIST, HIPPA, PCI DSS, and SOX.

KIGGU PRO Currently supports the following technologies list:


  • AIX Local Security Checks
  • Alma Linux Local Security Checks
  • Amazon Linux Local Security Checks
  • Backdoors
  • Brute force attacks
  • CGI abuses
  • CGI abuses : XSS
  • CentOS Local Security Checks
  • DNS
  • Databases
  • Debian Local Security Checks
  • Default Unix Accounts
  • Denial of Service
  • F5 Networks Local Security Checks
  • FTP
  • Fedora Local Security Checks
  • Firewalls
  • FreeBSD Local Security Checks
  • Gain a shell remotely
  • General
  • Gentoo Local Security Checks
  • HP-UX Local Security Checks
  • Huawei Local Security Checks
  • Junos Local Security Checks
  • MacOS X Local Security Checks
  • Mandriva Local Security Checks
  • MarinerOS Local Security Checks
  • Misc.
  • Mobile Devices
  • Netware
  • NewStart CGSL Local Security Checks
  • Oracle Linux Local Security Checks
  • OracleVM Local Security Checks
  • Palo Alto Local Security Checks
  • Peer-To-Peer File Sharing
  • PhotonOS Local Security Checks
  • Policy Compliance
  • Port scanners
  • RPC
  • Red Hat Local Security Checks
  • Rocky Linux Local Security Checks
  • SMTP problems
  • SNMP
  • Scientific Linux Local Security Checks
  • Service detection
  • Settings
  • Slackware Local Security Checks
  • Solaris Local Security Checks
  • SuSE Local Security Checks
  • Ubuntu Local Security Checks
  • VMware ESX Local Security Checks
  • Virtuozzo Local Security Checks
  • Web Servers
  • Windows
  • Windows Microsoft Bulletins
  • Windows User management


We are here for you, do not hesitate to contact us


Explore the Range of Our Services

KIGGU Pro – VM – Vulnerability Management

Manage risks of your information assets with our platform that organizes vulnerability recognition tasks.

KIGGU Pro – Diagnose

Platform to evaluate the digital vulnerabilities of your WIFI network.


Easy-to-run code review tests for detecting known common bugs and vulnerabilities.