Got any questions?

We do our best to respond within 2 business hours (GMT)

PC Flank

Port Scanning Resources

PC Flank was an online service that provided various penetration testing and security testing tools aimed at helping users assess the vulnerability of their internet-connected systems. Launched in the early 2000s, it gained popularity among everyday users and security enthusiasts for its straightforward, user-friendly interface, allowing them to perform basic security checks without needing extensive technical knowledge. If you landed on this page looking for a modern alternative to PC Flank, then we recommend you check out Shodan.io as a modern web based port scanning alternative.

Key Features of PC Flank:

Sadly, PCFlank.com was no longer maintained, which we felt was a great loss to it's legacy and the awareness that it brought to the industry back in the day. However due to the synergies between PC Flank and the articles we cover on our blog, which include our resource explaining what is port scanning, pcflank.com will be merged with aptive.co.uk from this point forward.

If you require an external port scan of your organisation see our web app security testing and penetration testing services.

More Security Testing Resources

  1. How Long Does Penetration Testing Take? Understanding Timeframes and Factors

    How Long Does Penetration Testing Take? Understanding Timeframes and Factors

    Discover the typical timeframes for various types of penetration testing, including network, web application, mobile application, and IoT testing. This article explores the factors that influence the duration of a penetration test, helping organisations plan effectively for comprehensive security assessments.

  2. How Often Should Penetration Testing Be Performed?

    How Often Should Penetration Testing Be Performed?

    Learn how often UK organisations should conduct penetration tests to meet compliance standards like PCI DSS and maintain strong security. Discover why annual testing is recommended and when additional tests may be necessary after system changes or security incidents.

  3. LLMNR / NBT-NS Spoofing Attack Explained

    LLMNR / NBT-NS Spoofing Attack Explained

    LLMNR / NBT-NS spoofing attack: how to use LLMNR & NetBIOS poisoning to capture credentials from the network using Kali + Responder.py and how to fix LLMNR & NBT-NS (NetBIOS) spoofing / poisoning attacks.

  4. Local File Inclusion (LFI)

    Local File Inclusion (LFI)

    Local File Inclusion (LFI) explained with examples, and learn how to perform security testing for LFI vulnerabilities. The intent of this document is to assist with web app security assessments engagements by consolidating research for LFI testing techniques. LFI vulnerabilities are typically discovered during application assessments or penetration testing using the techniques contained within this document.

  5. Log Injection Attack Explained: Risks, Exploits, and Defences

    Log Injection Attack Explained: Risks, Exploits, and Defences

    Learn about log injection attacks, their risks, and how to defend against them with strategies like input sanitisation, secure logging practices, and defence-in-depth approaches.

  6. Remote Code Execution via Log Injection: Understanding the Threat and Mitigations

    Remote Code Execution via Log Injection: Understanding the Threat and Mitigations

    Explore the dangers of Remote Code Execution (RCE) through log injection attacks, how they occur, and effective mitigation strategies.

  7. Log Injection vs Log Forgery: Learn the Differences and Implications

    Log Injection vs Log Forgery: Learn the Differences and Implications

    Learn the differences between log injection and log forgery, how each attack works, and the security implications for organisations.

  8. XSS Log Injection: Risks and Defences Explained

    XSS Log Injection: Risks and Defences Explained

    Learn how Cross-Site Scripting (XSS) can be exploited through log file injection attacks, the mechanisms behind these vulnerabilities, and effective best practices for prevention and mitigation.

  9. OWASP Mobile Top 10 (2024) - Explained

    OWASP Mobile Top 10 (2024) - Explained

    Discover the key updates in the OWASP Mobile Top 10 for 2024, highlighting the most critical mobile app security risks. Learn about emerging threats, new vulnerabilities, and best practices for safeguarding mobile applications.

  10. Vulnerability Testing vs Penetration Testing: Learn the Key Differences

    Vulnerability Testing vs Penetration Testing: Learn the Key Differences

    Understand the key differences between vulnerability testing and penetration testing. This article explores how each approach works, their depth of analysis, automation, reporting, frequency, cost, and use cases, helping organisations choose the right method to protect their systems.

  11. The Key Benefits of Penetration Testing for UK Organisations

    The Key Benefits of Penetration Testing for UK Organisations

    The key benefits of penetration testing for UK organisations, including identifying vulnerabilities, ensuring compliance with regulations like PCI DSS and GDPR, helping to prevent costly breaches, and strengthening overall security. Discover how regular testing enhances incident response and protects client trust.

  12. How Much Does Penetration Testing Cost in the UK? A Detailed Breakdown

    How Much Does Penetration Testing Cost in the UK? A Detailed Breakdown

    Discover the typical costs of penetration testing in the UK, from web and network tests to red teaming and compliance-related assessments like PCI DSS. Learn how factors such as scope, complexity, and provider certification influence the price of penetration tests.

  13. Penetration Testing Phases: The 7 Key Steps

    Penetration Testing Phases: The 7 Key Steps

    Learn the key stages involved in a penetration test, from planning and information gathering to exploitation, reporting, and remediation. Discover how this process helps UK organisations identify and fix security vulnerabilities to protect against cyber threats.

  14. Understand the Different Types of Penetration Testing

    Understand the Different Types of Penetration Testing

    Learn the types of penetration testing, including network, web application, API, and IoT testing. Learn how each test helps UK organisations uncover vulnerabilities, secure their systems, and protect against cyber threats.

  15. Understanding Rootkits: Detection, Prevention, and Defence

    Understanding Rootkits: Detection, Prevention, and Defence

    This article explores the insidious nature of rootkits, detailing their types, how they operate, and the dangers they pose. It provides a clear explanation of how to detect, remove, and prevent rootkit infections through effective strategies such as defence in depth, security hardening, and specialised tools. Aimed at both cybersecurity professionals and informed users, this guide offers crucial insights into protecting systems from these stealthy and sophisticated threats.

  16. Does SameSite Provide Sufficient CSRF Defence?

    Does SameSite Provide Sufficient CSRF Defence?

    An overview on what the SameSite cookie attribute is, and if it provides sufficient protection against CSRF on it's own without other mitigations.

  17. SSL & TLS HTTPS Testing Guide

    SSL & TLS HTTPS Testing Guide

    The definitive guide for SSL / TLS security testing by Aptive. This article documents the process of using semi automated tools to perform SSL & TLS security assessments and how to validate the tool findings using manual testing methods. The aim is to optimise the TLS & SSL security testing process when performing pen testing to optimise the time spent on TLS security testing.

  18. Unrestricted File Upload Testing & Bypass Techniques

    Unrestricted File Upload Testing & Bypass Techniques

    What is Unrestricted File Upload Testing and how to test for Unrestricted File Upload Vulnerabilities including filter bypass techniques for Windows, Linux, Apache and IIS.

  19. What is a Brute Force Attack? Methods, Examples, and Prevention

    What is a Brute Force Attack? Methods, Examples, and Prevention

    Learn what a brute force attack is, how adversaries use it to crack passwords, and explore effective methods and best practices to prevent these attacks from compromising your systems and data.

  20. What is Port Scanning? Port Scans Explained

    What is Port Scanning? Port Scans Explained

    Learn the basics of port scanning, a network security technique used to identify open ports, services, and potential vulnerabilities on a system. Discover different types of port scans, their uses in cybersecurity, and how they help assess and secure network infrastructures.

  21. What is Security Testing?

    What is Security Testing?

    Understand the importance of security testing and explore Delta's comprehensive range of services, including web app, mobile app, penetration testing, IoT, API, cloud, and vulnerability testing to safeguard your digital assets.

  22. What is XPath Injection?

    What is XPath Injection?

    Learn about XPath Injection, a critical web security vulnerability that exploits improper handling of user input in XML queries. Discover how to prevent attacks with secure coding practices, input validation, and parameterised queries.

  23. Why Penetration Testing is Important

    Why Penetration Testing is Important

    Penetration testing plays a crucial role in safeguarding organisations from cyber threats by simulating real-world attacks to identify vulnerabilities. This article explores why pen testing is essential for enhancing security posture, ensuring regulatory compliance, preventing financial loss, and improving incident response. Learn how regular penetration testing can help protect your organisation’s reputation and data in an increasingly hostile digital environment.

  24. What is Cross-site Scripting (XSS)? XSS Explained

    What is Cross-site Scripting (XSS)? XSS Explained

    An overview of what SQL Injection is, understand the attack, and the potential risk to your organisation.