KIGGU Consultant - Etichal Hacking

Advanced ethical hacking using MITRE ATT&CK® to identify and exploit potential vulnerabilities.


KIGGU Consultant - Etichal Hacking

Ethical Hacking is more than just a security check; it’s a rigorous assessment of your organization’s cyber defenses. By employing the MITRE ATT&CK® methodology, our service starts with a reconnaissance phase, followed by scanning and analysis, and culminates in controlled intrusion tests.

This advanced complexity service is designed for those who seek a deep, comprehensive understanding of their vulnerabilities and wish to address them effectively.


Discover the passages of our ethical hacking diagnosis


Determining the critical IT and communications infrastructure for the Ethical Hacking assessment.


An introductory presentation outlining the assessment’s logistics, techniques, methodologies, and schedule.


 Identifying pertinent information and researching assets.


Port and service scans, banner scans, vulnerability scans, and subsequent analysis.


Comprehensive attacks on assets, employing offensive techniques, intrusions, exploit executions, password attacks, and penetration tests. 


Delivering insights from the Ethical Hacking findings.


An executive summary and presentation of all results.



Our Ethical Hacking service is rooted in globally recognized methodologies such as OWASP, OSSTMM, NIST, OFFSEC, and the MITRE ATT&CK® framework.

Our team holds a variety of certifications:

  •       Certified Information Systems Security Professional (CISSP) 
  •       GIAC Security Essentials Certification (GSEC)
  •       GIAC Certified Incident Handler (GCIH)
  •       GIAC Penetration Tester (GPEN)
  •       Offensive Security Certified Professional (OSCP)
  •       Offensive Security Wireless Professional (OSWP)
  •       Offensive Security Certified Expert (OSCE)
  •       Offensive Security Exploitation Expert (OSEE)
  •       Licensed Penetration Tester (LPT)
  •       Certified Ethical Hacker (CEH)

We advocate for this service to be applied to the CRITICAL IT and communications infrastructure of any organization.

We simulate attacks on various networks, including LAN (Internal) and WAN (Internet), and target emails from different organizational roles.

Clients will receive detailed reports in both PDF and EXCEL formats, covering both executive and technical aspects of the service. Additionally, evidence for each technique employed will be provided. All our reports align with international compliance regulations such as ISO, NIST, HIPPA, PCI DSS, and SOX.

KIGGU PRO Currently supports the following technologies list:

  • AIX Local Security Checks
  • Alma Linux Local Security Checks
  • Amazon Linux Local Security Checks
  • Backdoors
  • Brute force attacks
  • CGI abuses
  • CGI abuses : XSS
  • CentOS Local Security Checks
  • DNS
  • Databases
  • Debian Local Security Checks
  • Default Unix Accounts
  • Denial of Service
  • F5 Networks Local Security Checks
  • FTP
  • Fedora Local Security Checks
  • Firewalls
  • FreeBSD Local Security Checks
  • Gain a shell remotely
  • General
  • Gentoo Local Security Checks
  • HP-UX Local Security Checks
  • Huawei Local Security Checks
  • Junos Local Security Checks
  • MacOS X Local Security Checks
  • Mandriva Local Security Checks
  • MarinerOS Local Security Checks
  • Misc.
  • Mobile Devices
  • Netware
  • NewStart CGSL Local Security Checks
  • Oracle Linux Local Security Checks
  • OracleVM Local Security Checks
  • Palo Alto Local Security Checks
  • Peer-To-Peer File Sharing
  • PhotonOS Local Security Checks
  • Policy Compliance
  • Port scanners
  • RPC
  • Red Hat Local Security Checks
  • Rocky Linux Local Security Checks
  • SMTP problems
  • SNMP
  • Scientific Linux Local Security Checks
  • Service detection
  • Settings
  • Slackware Local Security Checks
  • Solaris Local Security Checks
  • SuSE Local Security Checks
  • Ubuntu Local Security Checks
  • VMware ESX Local Security Checks
  • Virtuozzo Local Security Checks
  • Web Servers
  • Windows
  • Windows Microsoft Bulletins
  • Windows User management

We are here for you, do not hesitate to contact us


Explore the Range of Our Services

KIGGU Pro – Diagnose

Platform to evaluate the digital vulnerabilities of your WIFI network.

KIGGU Consultant – Ethical hacking

Advanced ethical hacking using MITRE ATT&CK® to identify and exploit potential vulnerabilities.

KIGGU Pro – VA – Vulnerability Assessment

Deep, advanced recognition of weaknesses using MITRE ATT&CK® methodology.