Got any questions?
We do our best to respond within 2 business hours (GMT)
Port Scanning Resources
PC Flank was an online service that provided various penetration testing and security testing tools aimed at helping users assess the vulnerability of their internet-connected systems. Launched in the early 2000s, it gained popularity among everyday users and security enthusiasts for its straightforward, user-friendly interface, allowing them to perform basic security checks without needing extensive technical knowledge. If you landed on this page looking for a modern alternative to PC Flank, then we recommend you check out Shodan.io as a modern web based port scanning alternative.
Sadly, PCFlank.com was no longer maintained, which we felt was a great loss to it's legacy and the awareness that it brought to the industry back in the day. However due to the synergies between PC Flank and the articles we cover on our blog, which include our resource explaining
If you require an external port scan of your organisation see our web app security testing and penetration testing services.
More Security Testing Resources
Discover the typical timeframes for various types of penetration testing, including network, web application, mobile application, and IoT testing. This article explores the factors that influence the duration of a penetration test, helping organisations plan effectively for comprehensive security assessments.
Learn how often UK organisations should conduct penetration tests to meet compliance standards like PCI DSS and maintain strong security. Discover why annual testing is recommended and when additional tests may be necessary after system changes or security incidents.
LLMNR / NBT-NS spoofing attack: how to use LLMNR & NetBIOS poisoning to capture credentials from the network using Kali + Responder.py and how to fix LLMNR & NBT-NS (NetBIOS) spoofing / poisoning attacks.
Local File Inclusion (LFI) explained with examples, and learn how to perform security testing for LFI vulnerabilities. The intent of this document is to assist with web app security assessments engagements by consolidating research for LFI testing techniques. LFI vulnerabilities are typically discovered during application assessments or penetration testing using the techniques contained within this document.
Learn about log injection attacks, their risks, and how to defend against them with strategies like input sanitisation, secure logging practices, and defence-in-depth approaches.
Explore the dangers of Remote Code Execution (RCE) through log injection attacks, how they occur, and effective mitigation strategies.
Learn the differences between log injection and log forgery, how each attack works, and the security implications for organisations.
Learn how Cross-Site Scripting (XSS) can be exploited through log file injection attacks, the mechanisms behind these vulnerabilities, and effective best practices for prevention and mitigation.
Discover the key updates in the OWASP Mobile Top 10 for 2024, highlighting the most critical mobile app security risks. Learn about emerging threats, new vulnerabilities, and best practices for safeguarding mobile applications.
Understand the key differences between vulnerability testing and penetration testing. This article explores how each approach works, their depth of analysis, automation, reporting, frequency, cost, and use cases, helping organisations choose the right method to protect their systems.
The key benefits of penetration testing for UK organisations, including identifying vulnerabilities, ensuring compliance with regulations like PCI DSS and GDPR, helping to prevent costly breaches, and strengthening overall security. Discover how regular testing enhances incident response and protects client trust.
Discover the typical costs of penetration testing in the UK, from web and network tests to red teaming and compliance-related assessments like PCI DSS. Learn how factors such as scope, complexity, and provider certification influence the price of penetration tests.
Learn the key stages involved in a penetration test, from planning and information gathering to exploitation, reporting, and remediation. Discover how this process helps UK organisations identify and fix security vulnerabilities to protect against cyber threats.
Learn the types of penetration testing, including network, web application, API, and IoT testing. Learn how each test helps UK organisations uncover vulnerabilities, secure their systems, and protect against cyber threats.
This article explores the insidious nature of rootkits, detailing their types, how they operate, and the dangers they pose. It provides a clear explanation of how to detect, remove, and prevent rootkit infections through effective strategies such as defence in depth, security hardening, and specialised tools. Aimed at both cybersecurity professionals and informed users, this guide offers crucial insights into protecting systems from these stealthy and sophisticated threats.
An overview on what the SameSite cookie attribute is, and if it provides sufficient protection against CSRF on it's own without other mitigations.
The definitive guide for SSL / TLS security testing by Aptive. This article documents the process of using semi automated tools to perform SSL & TLS security assessments and how to validate the tool findings using manual testing methods. The aim is to optimise the TLS & SSL security testing process when performing pen testing to optimise the time spent on TLS security testing.
What is Unrestricted File Upload Testing and how to test for Unrestricted File Upload Vulnerabilities including filter bypass techniques for Windows, Linux, Apache and IIS.
Learn what a brute force attack is, how adversaries use it to crack passwords, and explore effective methods and best practices to prevent these attacks from compromising your systems and data.
Learn the basics of port scanning, a network security technique used to identify open ports, services, and potential vulnerabilities on a system. Discover different types of port scans, their uses in cybersecurity, and how they help assess and secure network infrastructures.
Understand the importance of security testing and explore Delta's comprehensive range of services, including web app, mobile app, penetration testing, IoT, API, cloud, and vulnerability testing to safeguard your digital assets.
Learn about XPath Injection, a critical web security vulnerability that exploits improper handling of user input in XML queries. Discover how to prevent attacks with secure coding practices, input validation, and parameterised queries.
Penetration testing plays a crucial role in safeguarding organisations from cyber threats by simulating real-world attacks to identify vulnerabilities. This article explores why pen testing is essential for enhancing security posture, ensuring regulatory compliance, preventing financial loss, and improving incident response. Learn how regular penetration testing can help protect your organisation’s reputation and data in an increasingly hostile digital environment.
An overview of what SQL Injection is, understand the attack, and the potential risk to your organisation.