KIGGU Pro – EH – Ethical Hacking

Advanced service for recognizing weaknesses and exploiting vulnerabilities.

Diagnose

KIGGU Pro – EH – Ethical Hacking

Our Ethical Hacking service executes Tactics and Techniques associated with the MITRE ATT&CK® methodology. The process begins with a recognition phase, followed by a scanning phase, and finally, controlled intrusion tests. This advanced complexity service provides a Dashboard to preview the results. If you’re looking to recognize weaknesses in a deep, advanced way and exploit the vulnerabilities found, this service is for you.

Diagnose

Uncover Your Vulnerabilities in Five Phases

Scope

Configure your Ethical Hacking parameters to suit your needs.

Recognition

We identify pertinent information and research your assets.

Scanning

We conduct comprehensive scanning of ports and services, banner scanning, vulnerability scanning, and analysis.

Exploitation

We execute attacks on assets, offensive techniques, intrusions, exploit execution, and “Password Attacks”

Reporting

Receive a detailed report from the service.

Diagnose

FAQ

We use the OWASP, OSSTMM, NIST, MITRE ATT&CK®, and OFFSEC methodologies in our Ethical Hacking service.

Our team holds a variety of certifications:

  •       Certified Information Systems Security Professional (CISSP) 
  •       GIAC Security Essentials Certification (GSEC)
  •       GIAC Certified Incident Handler (GCIH)
  •       GIAC Penetration Tester (GPEN)
  •       Offensive Security Certified Professional (OSCP)
  •       Offensive Security Wireless Professional (OSWP)
  •       Offensive Security Certified Expert (OSCE)
  •       Offensive Security Exploitation Expert (OSEE)
  •       Licensed Penetration Tester (LPT)
  •       Certified Ethical Hacker (CEH)

We recommend running this service on the CRITICAL IT and communications infrastructure of an organization.

We can evaluate both LAN – Local Area Network (INTERNAL) and WAN – Wide Area Network (INTERNET).

You will receive a consolidated report in EXCEL format with technical details of the vulnerabilities. You can also generate differential reports between one scan and another. Our platform generates reports that are aligned under international compliance regulations such as ISO, NIST, HIPPA, PCI DSS, and SOX.

KIGGU PRO Currently supports the following technologies list:

 

  • AIX Local Security Checks
  • Alma Linux Local Security Checks
  • Amazon Linux Local Security Checks
  • Backdoors
  • Brute force attacks
  • CGI abuses
  • CGI abuses : XSS
  • CISCO
  • CentOS Local Security Checks
  • DNS
  • Databases
  • Debian Local Security Checks
  • Default Unix Accounts
  • Denial of Service
  • F5 Networks Local Security Checks
  • FTP
  • Fedora Local Security Checks
  • Firewalls
  • FreeBSD Local Security Checks
  • Gain a shell remotely
  • General
  • Gentoo Local Security Checks
  • HP-UX Local Security Checks
  • Huawei Local Security Checks
  • Junos Local Security Checks
  • MacOS X Local Security Checks
  • Mandriva Local Security Checks
  • MarinerOS Local Security Checks
  • Misc.
  • Mobile Devices
  • Netware
  • NewStart CGSL Local Security Checks
  • Oracle Linux Local Security Checks
  • OracleVM Local Security Checks
  • Palo Alto Local Security Checks
  • Peer-To-Peer File Sharing
  • PhotonOS Local Security Checks
  • Policy Compliance
  • Port scanners
  • RPC
  • Red Hat Local Security Checks
  • Rocky Linux Local Security Checks
  • SCADA
  • SMTP problems
  • SNMP
  • Scientific Linux Local Security Checks
  • Service detection
  • Settings
  • Slackware Local Security Checks
  • Solaris Local Security Checks
  • SuSE Local Security Checks
  • Ubuntu Local Security Checks
  • VMware ESX Local Security Checks
  • Virtuozzo Local Security Checks
  • Web Servers
  • Windows
  • Windows Microsoft Bulletins
  • Windows User management

 

We are here for you, do not hesitate to contact us

Services

Explore the Range of Our Services

KIGGU Mobile App – Diagnose

World's only mobile platform for assessing vulnerabilities of WIFI-connected devices.

KIGGU Pro – SP – Spear Phishing

Targeted phishing tests to enhance individual awareness and protect sensitive organizational data.

KIGGU Consultant – Ethical hacking

Advanced ethical hacking using MITRE ATT&CK® to identify and exploit potential vulnerabilities.