KIGGU Consultant - Etichal Hacking

Advanced ethical hacking using MITRE ATT&CK® to identify and exploit potential vulnerabilities.

Diagnose

KIGGU Consultant - Etichal Hacking

Ethical Hacking is more than just a security check; it’s a rigorous assessment of your organization’s cyber defenses. By employing the MITRE ATT&CK® methodology, our service starts with a reconnaissance phase, followed by scanning and analysis, and culminates in controlled intrusion tests.

This advanced complexity service is designed for those who seek a deep, comprehensive understanding of their vulnerabilities and wish to address them effectively.

Diagnose

Discover the passages of our ethical hacking diagnosis

Scope

Determining the critical IT and communications infrastructure for the Ethical Hacking assessment.

Kickoff

An introductory presentation outlining the assessment’s logistics, techniques, methodologies, and schedule.

Recognition

 Identifying pertinent information and researching assets.

Scanning

Port and service scans, banner scans, vulnerability scans, and subsequent analysis.

Exploitation

Comprehensive attacks on assets, employing offensive techniques, intrusions, exploit executions, password attacks, and penetration tests. 

Reporting

Delivering insights from the Ethical Hacking findings.

Presentation

An executive summary and presentation of all results.

Diagnose

FAQ

Our Ethical Hacking service is rooted in globally recognized methodologies such as OWASP, OSSTMM, NIST, OFFSEC, and the MITRE ATT&CK® framework.

Our team holds a variety of certifications:

  •       Certified Information Systems Security Professional (CISSP) 
  •       GIAC Security Essentials Certification (GSEC)
  •       GIAC Certified Incident Handler (GCIH)
  •       GIAC Penetration Tester (GPEN)
  •       Offensive Security Certified Professional (OSCP)
  •       Offensive Security Wireless Professional (OSWP)
  •       Offensive Security Certified Expert (OSCE)
  •       Offensive Security Exploitation Expert (OSEE)
  •       Licensed Penetration Tester (LPT)
  •       Certified Ethical Hacker (CEH)

We advocate for this service to be applied to the CRITICAL IT and communications infrastructure of any organization.

We simulate attacks on various networks, including LAN (Internal) and WAN (Internet), and target emails from different organizational roles.

Clients will receive detailed reports in both PDF and EXCEL formats, covering both executive and technical aspects of the service. Additionally, evidence for each technique employed will be provided. All our reports align with international compliance regulations such as ISO, NIST, HIPPA, PCI DSS, and SOX.

KIGGU PRO Currently supports the following technologies list:

  • AIX Local Security Checks
  • Alma Linux Local Security Checks
  • Amazon Linux Local Security Checks
  • Backdoors
  • Brute force attacks
  • CGI abuses
  • CGI abuses : XSS
  • CISCO
  • CentOS Local Security Checks
  • DNS
  • Databases
  • Debian Local Security Checks
  • Default Unix Accounts
  • Denial of Service
  • F5 Networks Local Security Checks
  • FTP
  • Fedora Local Security Checks
  • Firewalls
  • FreeBSD Local Security Checks
  • Gain a shell remotely
  • General
  • Gentoo Local Security Checks
  • HP-UX Local Security Checks
  • Huawei Local Security Checks
  • Junos Local Security Checks
  • MacOS X Local Security Checks
  • Mandriva Local Security Checks
  • MarinerOS Local Security Checks
  • Misc.
  • Mobile Devices
  • Netware
  • NewStart CGSL Local Security Checks
  • Oracle Linux Local Security Checks
  • OracleVM Local Security Checks
  • Palo Alto Local Security Checks
  • Peer-To-Peer File Sharing
  • PhotonOS Local Security Checks
  • Policy Compliance
  • Port scanners
  • RPC
  • Red Hat Local Security Checks
  • Rocky Linux Local Security Checks
  • SCADA
  • SMTP problems
  • SNMP
  • Scientific Linux Local Security Checks
  • Service detection
  • Settings
  • Slackware Local Security Checks
  • Solaris Local Security Checks
  • SuSE Local Security Checks
  • Ubuntu Local Security Checks
  • VMware ESX Local Security Checks
  • Virtuozzo Local Security Checks
  • Web Servers
  • Windows
  • Windows Microsoft Bulletins
  • Windows User management

We are here for you, do not hesitate to contact us

Services

Explore the Range of Our Services

KIGGU Mobile App – Diagnose

World's only mobile platform for assessing vulnerabilities of WIFI-connected devices.

KIGGU Consultant – Red team

Next-gen cybernetic tests with a team attacking the organization permanently to find any weaknesses.

KIGGU Pro – WAS – Web Application Scanning

Identify digital vulnerabilities of WEB APPS or WEB Services with our cloud platform.