Technical Report

DDoS Vulnerability Assessment
Acme Corp | Report ID: DDT-20251211-011 | Date: 2025-12-11

Assessment Overview

11
Assets Scanned
20
Total Findings
3
CDN Protected
6
Origin Exposed
Risk Score7.1/10 (Critical)
Critical Findings6
High Findings8
Medium Findings12
Low Findings6

Asset Inventory

Subdomain IP Address HTTP Status CDN WAF ASN
www.acmecorp.com 104.16.123.45 200 Yes Cloudflare Cloudflare, Inc.
api.acmecorp.com 52.45.123.100 200 No - Amazon.com, Inc.
api-internal.acmecorp.com 203.0.113.10 200 No - Acme Corp Data Center
staging.acmecorp.com 203.0.113.11 200 No - Acme Corp Data Center
dev.acmecorp.com 203.0.113.12 401 No - Acme Corp Data Center
legacy.acmecorp.com 203.0.113.15 200 No - Acme Corp Data Center
mail.acmecorp.com 203.0.113.20 - No - Acme Corp Data Center
app.acmecorp.com 104.16.125.45 200 Yes Cloudflare Cloudflare, Inc.
store.acmecorp.com 104.16.126.45 200 Yes Cloudflare Cloudflare, Inc.
dashboard.acmecorp.com 52.45.123.101 302 No AWS WAF Amazon.com, Inc.
vpn.acmecorp.com 203.0.113.25 - No - Acme Corp Data Center

Port & Protocol Details

SubdomainIPL7 ProtocolsNmap Results
api-internal.acmecorp.com 203.0.113.10 SSH, MySQL 22/tcp open ssh, 80/tcp open http, 443/tcp open https, 3306/tcp open mysql
staging.acmecorp.com 203.0.113.11 - 22/tcp open ssh, 80/tcp open http, 443/tcp open https
dev.acmecorp.com 203.0.113.12 SSH 22/tcp open ssh, 80/tcp open http, 443/tcp open https, 8080/tcp open http-proxy
legacy.acmecorp.com 203.0.113.15 FTP 21/tcp open ftp, 22/tcp open ssh, 80/tcp open http, 443/tcp open https
mail.acmecorp.com 203.0.113.20 SMTP, SMTP_TLS, SMTP_STARTTLS 25/tcp open smtp, 110/tcp open pop3, 143/tcp open imap, 465/tcp open smtps, 587/tcp open submission, 993/tcp open imaps
vpn.acmecorp.com 203.0.113.25 - 443/tcp open https, 1194/tcp open openvpn

Detailed Findings

1. Origin Server Directly Accessible: api.acmecorp.com Critical

api.acmecorp.com (52.45.123.100)

The origin server at 52.45.123.100 is directly accessible from the internet, bypassing all CDN/WAF protections.

Complete service outage possible with relatively small attack volume. CDN investment provides no protection.

Configure origin firewall to only accept traffic from CDN IP ranges. Consider origin IP rotation.

2. Origin Server Directly Accessible: api-internal.acmecorp.com Critical

api-internal.acmecorp.com (203.0.113.10)

The origin server at 203.0.113.10 is directly accessible from the internet, bypassing all CDN/WAF protections.

Complete service outage possible with relatively small attack volume. CDN investment provides no protection.

Configure origin firewall to only accept traffic from CDN IP ranges. Consider origin IP rotation.

3. Origin Server Directly Accessible: staging.acmecorp.com Critical

staging.acmecorp.com (203.0.113.11)

The origin server at 203.0.113.11 is directly accessible from the internet, bypassing all CDN/WAF protections.

Complete service outage possible with relatively small attack volume. CDN investment provides no protection.

Configure origin firewall to only accept traffic from CDN IP ranges. Consider origin IP rotation.

4. Origin Server Directly Accessible: dev.acmecorp.com Critical

dev.acmecorp.com (203.0.113.12)

The origin server at 203.0.113.12 is directly accessible from the internet, bypassing all CDN/WAF protections.

Complete service outage possible with relatively small attack volume. CDN investment provides no protection.

Configure origin firewall to only accept traffic from CDN IP ranges. Consider origin IP rotation.

5. Origin Server Directly Accessible: legacy.acmecorp.com Critical

legacy.acmecorp.com (203.0.113.15)

The origin server at 203.0.113.15 is directly accessible from the internet, bypassing all CDN/WAF protections.

Complete service outage possible with relatively small attack volume. CDN investment provides no protection.

Configure origin firewall to only accept traffic from CDN IP ranges. Consider origin IP rotation.

6. Origin Server Directly Accessible: dashboard.acmecorp.com Critical

dashboard.acmecorp.com (52.45.123.101)

The origin server at 52.45.123.101 is directly accessible from the internet, bypassing all CDN/WAF protections.

Complete service outage possible with relatively small attack volume. CDN investment provides no protection.

Configure origin firewall to only accept traffic from CDN IP ranges. Consider origin IP rotation.

7. API Endpoints Discovered: api.acmecorp.com High

api.acmecorp.com (52.45.123.100)

API endpoints found: /api/v1/users, /api/v1/products, /api/v1/orders, /api/v2/auth, /api/v2/webhooks. Rate limiting status unknown.

Application-layer DDoS attacks can exhaust backend resources. API abuse possible.

Implement rate limiting at CDN/WAF level. Add authentication rate limits for sensitive endpoints.

8. API Endpoints Discovered: api-internal.acmecorp.com High

api-internal.acmecorp.com (203.0.113.10)

API endpoints found: /internal/api/v1/admin, /internal/api/v1/config. Rate limiting status unknown.

Application-layer DDoS attacks can exhaust backend resources. API abuse possible.

Implement rate limiting at CDN/WAF level. Add authentication rate limits for sensitive endpoints.

9. API Endpoints Discovered: app.acmecorp.com High

app.acmecorp.com (104.16.125.45)

API endpoints found: /app/api/login, /app/api/dashboard. Rate limiting status unknown.

Application-layer DDoS attacks can exhaust backend resources. API abuse possible.

Implement rate limiting at CDN/WAF level. Add authentication rate limits for sensitive endpoints.

10. API Endpoints Discovered: store.acmecorp.com High

store.acmecorp.com (104.16.126.45)

API endpoints found: /checkout/api, /cart/api. Rate limiting status unknown.

Application-layer DDoS attacks can exhaust backend resources. API abuse possible.

Implement rate limiting at CDN/WAF level. Add authentication rate limits for sensitive endpoints.

11. API Endpoints Discovered: dashboard.acmecorp.com High

dashboard.acmecorp.com (52.45.123.101)

API endpoints found: /api/v1/metrics, /api/v1/alerts. Rate limiting status unknown.

Application-layer DDoS attacks can exhaust backend resources. API abuse possible.

Implement rate limiting at CDN/WAF level. Add authentication rate limits for sensitive endpoints.

12. No WAF Detected: api.acmecorp.com Medium

api.acmecorp.com (52.45.123.100)

No Web Application Firewall detected in HTTP responses.

Application-layer attacks may not be filtered. Vulnerable to HTTP floods.

Deploy WAF (Cloudflare, AWS WAF, etc.) to filter malicious requests.

13. L7 Protocols Exposed: api-internal.acmecorp.com Medium

api-internal.acmecorp.com (203.0.113.10)

Non-HTTP protocols found: SSH, MySQL.

Additional attack surface for protocol-specific attacks.

Review necessity of exposed protocols. Apply rate limiting and access controls.

14. No WAF Detected: api-internal.acmecorp.com Medium

api-internal.acmecorp.com (203.0.113.10)

No Web Application Firewall detected in HTTP responses.

Application-layer attacks may not be filtered. Vulnerable to HTTP floods.

Deploy WAF (Cloudflare, AWS WAF, etc.) to filter malicious requests.

15. No WAF Detected: staging.acmecorp.com Medium

staging.acmecorp.com (203.0.113.11)

No Web Application Firewall detected in HTTP responses.

Application-layer attacks may not be filtered. Vulnerable to HTTP floods.

Deploy WAF (Cloudflare, AWS WAF, etc.) to filter malicious requests.

16. L7 Protocols Exposed: dev.acmecorp.com Medium

dev.acmecorp.com (203.0.113.12)

Non-HTTP protocols found: SSH.

Additional attack surface for protocol-specific attacks.

Review necessity of exposed protocols. Apply rate limiting and access controls.

17. No WAF Detected: dev.acmecorp.com Medium

dev.acmecorp.com (203.0.113.12)

No Web Application Firewall detected in HTTP responses.

Application-layer attacks may not be filtered. Vulnerable to HTTP floods.

Deploy WAF (Cloudflare, AWS WAF, etc.) to filter malicious requests.

18. L7 Protocols Exposed: legacy.acmecorp.com Medium

legacy.acmecorp.com (203.0.113.15)

Non-HTTP protocols found: FTP.

Additional attack surface for protocol-specific attacks.

Review necessity of exposed protocols. Apply rate limiting and access controls.

19. No WAF Detected: legacy.acmecorp.com Medium

legacy.acmecorp.com (203.0.113.15)

No Web Application Firewall detected in HTTP responses.

Application-layer attacks may not be filtered. Vulnerable to HTTP floods.

Deploy WAF (Cloudflare, AWS WAF, etc.) to filter malicious requests.

20. L7 Protocols Exposed: mail.acmecorp.com Medium

mail.acmecorp.com (203.0.113.20)

Non-HTTP protocols found: SMTP, SMTP_TLS, SMTP_STARTTLS.

Additional attack surface for protocol-specific attacks.

Review necessity of exposed protocols. Apply rate limiting and access controls.

Remediation Summary

Immediate Actions (Critical)

Short-term Actions (7-14 days)

Long-term Actions (30+ days)