KIGGU Consultant - Penetration test PCI DSS & Compilance

Comprehensive penetration testing aligned with major compliance standards for robust security assessment.


KIGGU Consultant - Penetration test PCI DSS & Compilance​

Dive deep into the security posture of your organization with our Penetration Test. Tailored to align with compliance methodologies like PCI DSS, NIST, SOX, SOC 2, HIPAA, ISO, and more, our service offers a comprehensive assessment. Starting with reconnaissance, followed by scanning and analysis, and culminating in controlled intrusion tests, we provide an advanced complexity service for those aiming to deeply understand and address their vulnerabilities.


Discover the phases of our pentest diagnosis


Determining the critical IT and communications infrastructure for the Penetration Test.


An introductory presentation outlining the assessment’s logistics, techniques, methodologies, and schedule.


Identifying pertinent information and researching assets.


Port and service scans, banner scans, vulnerability scans, and subsequent analysis.


Comprehensive attacks on assets, employing offensive techniques, intrusions, exploit executions, and password attacks


Delivering insights from the Penetration Test findings.


An executive summary and presentation of all results.



Our Penetration Test is rooted in globally recognized methodologies such as OWASP, OSSTMM, NIST, OFFSEC, and the MITRE ATT&CK® framework.

Our team holds a variety of certifications:

  •       Certified Information Systems Security Professional (CISSP) 
  •       GIAC Security Essentials Certification (GSEC)
  •       GIAC Certified Incident Handler (GCIH)
  •       GIAC Penetration Tester (GPEN)
  •       Offensive Security Certified Professional (OSCP)
  •       Offensive Security Wireless Professional (OSWP)
  •       Offensive Security Certified Expert (OSCE)
  •       Offensive Security Exploitation Expert (OSEE)
  •       Licensed Penetration Tester (LPT)
  •       Certified Ethical Hacker (CEH)

We advocate for this service to be applied to the CRITICAL IT and communications infrastructure of any organization.

We simulate attacks on various networks, including LAN (Internal) and WAN (Internet), and target emails from different organizational roles.

Clients will receive detailed reports in both PDF and EXCEL formats, covering both executive and technical aspects of the service. Additionally, evidence for each technique employed will be provided. All our reports align with international compliance regulations such as ISO, NIST, HIPPA, PCI DSS, and SOX.

KIGGU PRO Currently supports the following technologies list:


  • AIX Local Security Checks
  • Alma Linux Local Security Checks
  • Amazon Linux Local Security Checks
  • Backdoors
  • Brute force attacks
  • CGI abuses
  • CGI abuses : XSS
  • CentOS Local Security Checks
  • DNS
  • Databases
  • Debian Local Security Checks
  • Default Unix Accounts
  • Denial of Service
  • F5 Networks Local Security Checks
  • FTP
  • Fedora Local Security Checks
  • Firewalls
  • FreeBSD Local Security Checks
  • Gain a shell remotely
  • General
  • Gentoo Local Security Checks
  • HP-UX Local Security Checks
  • Huawei Local Security Checks
  • Junos Local Security Checks
  • MacOS X Local Security Checks
  • Mandriva Local Security Checks
  • MarinerOS Local Security Checks
  • Misc.
  • Mobile Devices
  • Netware
  • NewStart CGSL Local Security Checks
  • Oracle Linux Local Security Checks
  • OracleVM Local Security Checks
  • Palo Alto Local Security Checks
  • Peer-To-Peer File Sharing
  • PhotonOS Local Security Checks
  • Policy Compliance
  • Port scanners
  • RPC
  • Red Hat Local Security Checks
  • Rocky Linux Local Security Checks
  • SMTP problems
  • SNMP
  • Scientific Linux Local Security Checks
  • Service detection
  • Settings
  • Slackware Local Security Checks
  • Solaris Local Security Checks
  • SuSE Local Security Checks
  • Ubuntu Local Security Checks
  • VMware ESX Local Security Checks
  • Virtuozzo Local Security Checks
  • Web Servers
  • Windows
  • Windows Microsoft Bulletins
  • Windows User management


We are here for you, do not hesitate to contact us


Explore the Range of Our Services

KIGGU Pro – VS – Vulnerability Scanning

Cloud platform for on-demand vulnerability scanning with high-quality results.

KIGGU Consultant – Ethical hacking

Advanced ethical hacking using MITRE ATT&CK® to identify and exploit potential vulnerabilities.

KIGGU Mobile App – Diagnose

World's only mobile platform for assessing vulnerabilities of WIFI-connected devices.