DDactic Logo
DDactic Find What Defenses Miss
CASE STUDY

Acme Corp

DDoS Vulnerability Assessment & Remediation

Note: This is a synthetic case study for demonstration purposes. All company names, IP addresses, and findings are fictional.

Executive Summary

Risk Score
7.1 2.8
Unprotected
7 0
Critical
3 0
High
4 0
Time
14 days

Client Profile

IndustryEnterprise Software (B2B SaaS)
Size500+ employees
InfrastructureHybrid (On-premise + AWS Cloud + Cloudflare CDN)
Primary ConcernBusiness continuity during DDoS attacks

The Challenge

Acme Corp experienced a 2-hour outage during a volumetric DDoS attack targeting their API infrastructure. While their public-facing website was protected by Cloudflare, attackers discovered and targeted their unprotected origin servers directly.

Key Pain Points

DDactic Assessment

Phase 1: Passive Reconnaissance

DDactic's passive reconnaissance identified:

Phase 2: Environment Breakdown

EnvironmentAssetsPercentageRisk Level
On-Premise747%CRITICAL
CDN (Cloudflare)533%Protected
Cloud (AWS)320%Moderate

Critical Findings

1. Unprotected On-Premise API Server

Direct origin IP exposure (203.0.113.10) with MySQL port accessible from internet. No WAF or rate limiting configured.

2. Legacy Server with EOL Software

Apache 2.2.22 / PHP 5.4.45 (unsupported since 2015) with FTP service containing known vulnerabilities.

3. Origin IP Leakage

Cloudflare could be bypassed via historical DNS records. SSL certificate transparency revealed origin IPs.

Remediation Actions

Week 1: Critical Fixes

FindingActionStatus
Unprotected APIDeployed behind Cloudflare proxyCompleted
MySQL exposureFirewall rule: block external 3306Completed
Legacy FTPDisabled, migrated to SFTPCompleted
Dev server exposureMoved behind VPNCompleted

Week 2: Hardening

AreaActionStatus
Origin protectionWhitelist only Cloudflare IPsCompleted
Rate limitingImplemented 100 req/s per IPCompleted
DNSSECEnabled for all zonesCompleted
Software updatesApache 2.4, PHP 8.1 on legacyCompleted

DDactic CLI Commands Used

# Origin IP protection
for ip in $(curl https://www.cloudflare.com/ips-v4); do
  iptables -A INPUT -p tcp -s $ip --dport 443 -j ACCEPT
done
iptables -A INPUT -p tcp --dport 443 -j DROP

# Rate limiting with nginx
limit_req_zone $binary_remote_addr zone=api:10m rate=100r/s;

# DNSSEC verification
dig acmecorp.com +dnssec

Results

Risk Score Reduction

Before
7.1/10
After
2.8/10

Attack Surface Reduction

Validation Testing

Test TypeParametersResult
Volumetric attack100 Gbps simulationMitigated by Cloudflare
Application-layer attack50K RPSRate limited
Origin bypass attemptsDirect IP targetingBlocked by whitelist
SSL/TLS attacksProtocol fuzzingNo vulnerabilities
"DDactic's assessment revealed critical blind spots in our DDoS protection strategy. Within two weeks, we went from a high-risk posture to industry-best practices. The detailed remediation steps and CLI commands made implementation straightforward."
— IT Security Director, Acme Corp (fictional)

Key Takeaways

  1. CDN protection alone is insufficient — Origin IP exposure negates CDN benefits
  2. Legacy systems are high-risk targets — Prioritize updates or isolation
  3. Development environments need protection — Often overlooked attack vectors
  4. Continuous monitoring is essential — Attack surfaces change over time

DDactic Services Used