KIGGU Consultant - Penetration test PCI DSS & Compilance

Comprehensive penetration testing aligned with major compliance standards for robust security assessment.

Diagnose

KIGGU Consultant - Penetration test PCI DSS & Compilance​

Dive deep into the security posture of your organization with our Penetration Test. Tailored to align with compliance methodologies like PCI DSS, NIST, SOX, SOC 2, HIPAA, ISO, and more, our service offers a comprehensive assessment. Starting with reconnaissance, followed by scanning and analysis, and culminating in controlled intrusion tests, we provide an advanced complexity service for those aiming to deeply understand and address their vulnerabilities.

Diagnose

Discover the phases of our pentest diagnosis

Scope

Determining the critical IT and communications infrastructure for the Penetration Test.

Kickoff

An introductory presentation outlining the assessment’s logistics, techniques, methodologies, and schedule.

Recognition

Identifying pertinent information and researching assets.

Scanning

Port and service scans, banner scans, vulnerability scans, and subsequent analysis.

Exploitation

Comprehensive attacks on assets, employing offensive techniques, intrusions, exploit executions, and password attacks

Reporting

Delivering insights from the Penetration Test findings.

Presentation

An executive summary and presentation of all results.

Diagnose

FAQ

Our Penetration Test is rooted in globally recognized methodologies such as OWASP, OSSTMM, NIST, OFFSEC, and the MITRE ATT&CK® framework.

Our team holds a variety of certifications:

  •       Certified Information Systems Security Professional (CISSP) 
  •       GIAC Security Essentials Certification (GSEC)
  •       GIAC Certified Incident Handler (GCIH)
  •       GIAC Penetration Tester (GPEN)
  •       Offensive Security Certified Professional (OSCP)
  •       Offensive Security Wireless Professional (OSWP)
  •       Offensive Security Certified Expert (OSCE)
  •       Offensive Security Exploitation Expert (OSEE)
  •       Licensed Penetration Tester (LPT)
  •       Certified Ethical Hacker (CEH)

We advocate for this service to be applied to the CRITICAL IT and communications infrastructure of any organization.

We simulate attacks on various networks, including LAN (Internal) and WAN (Internet), and target emails from different organizational roles.

Clients will receive detailed reports in both PDF and EXCEL formats, covering both executive and technical aspects of the service. Additionally, evidence for each technique employed will be provided. All our reports align with international compliance regulations such as ISO, NIST, HIPPA, PCI DSS, and SOX.

KIGGU PRO Currently supports the following technologies list:

 

  • AIX Local Security Checks
  • Alma Linux Local Security Checks
  • Amazon Linux Local Security Checks
  • Backdoors
  • Brute force attacks
  • CGI abuses
  • CGI abuses : XSS
  • CISCO
  • CentOS Local Security Checks
  • DNS
  • Databases
  • Debian Local Security Checks
  • Default Unix Accounts
  • Denial of Service
  • F5 Networks Local Security Checks
  • FTP
  • Fedora Local Security Checks
  • Firewalls
  • FreeBSD Local Security Checks
  • Gain a shell remotely
  • General
  • Gentoo Local Security Checks
  • HP-UX Local Security Checks
  • Huawei Local Security Checks
  • Junos Local Security Checks
  • MacOS X Local Security Checks
  • Mandriva Local Security Checks
  • MarinerOS Local Security Checks
  • Misc.
  • Mobile Devices
  • Netware
  • NewStart CGSL Local Security Checks
  • Oracle Linux Local Security Checks
  • OracleVM Local Security Checks
  • Palo Alto Local Security Checks
  • Peer-To-Peer File Sharing
  • PhotonOS Local Security Checks
  • Policy Compliance
  • Port scanners
  • RPC
  • Red Hat Local Security Checks
  • Rocky Linux Local Security Checks
  • SCADA
  • SMTP problems
  • SNMP
  • Scientific Linux Local Security Checks
  • Service detection
  • Settings
  • Slackware Local Security Checks
  • Solaris Local Security Checks
  • SuSE Local Security Checks
  • Ubuntu Local Security Checks
  • VMware ESX Local Security Checks
  • Virtuozzo Local Security Checks
  • Web Servers
  • Windows
  • Windows Microsoft Bulletins
  • Windows User management

 

We are here for you, do not hesitate to contact us

Services

Explore the Range of Our Services

KIGGU Pro – VA – Vulnerability Assessment

Deep, advanced recognition of weaknesses using MITRE ATT&CK® methodology.

KIGGU Consultant – Ethical hacking

Advanced ethical hacking using MITRE ATT&CK® to identify and exploit potential vulnerabilities.

KIGGU Pro – EH – Ethical Hacking

Advanced service for recognizing weaknesses and exploiting vulnerabilities.