Advanced service for recognizing weaknesses and exploiting vulnerabilities.
Our Ethical Hacking service executes Tactics and Techniques associated with the MITRE ATT&CK® methodology. The process begins with a recognition phase, followed by a scanning phase, and finally, controlled intrusion tests. This advanced complexity service provides a Dashboard to preview the results. If you’re looking to recognize weaknesses in a deep, advanced way and exploit the vulnerabilities found, this service is for you.
Configure your Ethical Hacking parameters to suit your needs.
We identify pertinent information and research your assets.
We conduct comprehensive scanning of ports and services, banner scanning, vulnerability scanning, and analysis.
We execute attacks on assets, offensive techniques, intrusions, exploit execution, and “Password Attacks”
Receive a detailed report from the service.
We use the OWASP, OSSTMM, NIST, MITRE ATT&CK®, and OFFSEC methodologies in our Ethical Hacking service.
Our team holds a variety of certifications:
We recommend running this service on the CRITICAL IT and communications infrastructure of an organization.
We can evaluate both LAN – Local Area Network (INTERNAL) and WAN – Wide Area Network (INTERNET).
You will receive a consolidated report in EXCEL format with technical details of the vulnerabilities. You can also generate differential reports between one scan and another. Our platform generates reports that are aligned under international compliance regulations such as ISO, NIST, HIPPA, PCI DSS, and SOX.
KIGGU PRO Currently supports the following technologies list: