Deep, advanced vulnerability recognition with the highest quality.
Our Vulnerability Assessment service leverages the MITRE ATT&CK® methodology to identify weaknesses in your IT infrastructure. The process begins with a recognition phase, followed by a scanning phase, and concludes with an analysis of the results.
This intermediate complexity service provides a dashboard for result previews, offering a deep, advanced, and high-quality vulnerability recognition.
Configure your Vulnerability Assessment to fit your needs.
We identify information and research assets.
We conduct port and service scanning, vulnerability scanning, and analysis.
Receive comprehensive reports and evidence of each technique used.
We use the OWASP, OSSTMM, NIST, MITRE ATT&CK®, and OFFSEC methodologies in our Ethical Hacking service.
Our team holds a variety of certifications:
We recommend running this service on the CRITICAL IT and communications infrastructure of an organization.
We can evaluate both LAN – Local Area Network (INTERNAL) and WAN – Wide Area Network (INTERNET).
You will receive a consolidated report in EXCEL format with technical details of the vulnerabilities. You can also generate differential reports between one scan and another. Our platform generates reports that are aligned under international compliance regulations such as ISO, NIST, HIPPA, PCI DSS, and SOX.
KIGGU PRO Currently supports the following technologies list: