Penetration Testing

Jiggsoft is not limited to performing standard penetration tests using our own unique platform. We are also quite familiar with many different testing methods such as OWASP, PTES, OSSTMM, NIST 800-115, PCI DSS, BSI and also other standards such as ISO/IEC 27000-series, to mention a few.

The ultimate goal of performing a penetration test is to reveal vulnerabilities in the cyber security of IT systems. We identify possible exploits in a system by adopting the tactics, techniques and procedures of professional hackers who may target your critical systems. A penetration test by definition does not only include physical USB attacks. This term also includes but is not limited to the testing of wireless networks, local-area networks, applications and websites. We at Jiggsoft only utilise free open source tools to help our clients. All of our workstations run Kali Linux and some other examples of the most common tools that we use are Metasploit, OWASP Zed Attack Proxy, Browser Exploitation Framework (BeEF), Pupy and OpenVAS.

However, we readily adopt different methods which all depend on the target machine. We achieve this by combining multiple strategies that simulate a real life hacker attack. Our penetration tests do not require any consultants to be sent to your company. Instead we can send you the right equipment that will establish a secure tunnel back to our main offices. This reduces costs, saves time and allows many specialists to engage in the same project and find the optimal solution for you!

Hello Jiggsoft,

My is and

my is

I have a for you,