| Industry | Enterprise Software (B2B SaaS) |
|---|---|
| Size | 500+ employees |
| Infrastructure | Hybrid (On-premise + AWS Cloud + Cloudflare CDN) |
| Primary Concern | Business continuity during DDoS attacks |
Acme Corp experienced a 2-hour outage during a volumetric DDoS attack targeting their API infrastructure. While their public-facing website was protected by Cloudflare, attackers discovered and targeted their unprotected origin servers directly.
DDactic's passive reconnaissance identified:
| Environment | Assets | Percentage | Risk Level |
|---|---|---|---|
| On-Premise | 7 | 47% | CRITICAL |
| CDN (Cloudflare) | 5 | 33% | Protected |
| Cloud (AWS) | 3 | 20% | Moderate |
Direct origin IP exposure (203.0.113.10) with MySQL port accessible from internet. No WAF or rate limiting configured.
Apache 2.2.22 / PHP 5.4.45 (unsupported since 2015) with FTP service containing known vulnerabilities.
Cloudflare could be bypassed via historical DNS records. SSL certificate transparency revealed origin IPs.
| Finding | Action | Status |
|---|---|---|
| Unprotected API | Deployed behind Cloudflare proxy | Completed |
| MySQL exposure | Firewall rule: block external 3306 | Completed |
| Legacy FTP | Disabled, migrated to SFTP | Completed |
| Dev server exposure | Moved behind VPN | Completed |
| Area | Action | Status |
|---|---|---|
| Origin protection | Whitelist only Cloudflare IPs | Completed |
| Rate limiting | Implemented 100 req/s per IP | Completed |
| DNSSEC | Enabled for all zones | Completed |
| Software updates | Apache 2.4, PHP 8.1 on legacy | Completed |
# Origin IP protection for ip in $(curl https://www.cloudflare.com/ips-v4); do iptables -A INPUT -p tcp -s $ip --dport 443 -j ACCEPT done iptables -A INPUT -p tcp --dport 443 -j DROP # Rate limiting with nginx limit_req_zone $binary_remote_addr zone=api:10m rate=100r/s; # DNSSEC verification dig acmecorp.com +dnssec
| Test Type | Parameters | Result |
|---|---|---|
| Volumetric attack | 100 Gbps simulation | Mitigated by Cloudflare |
| Application-layer attack | 50K RPS | Rate limited |
| Origin bypass attempts | Direct IP targeting | Blocked by whitelist |
| SSL/TLS attacks | Protocol fuzzing | No vulnerabilities |
"DDactic's assessment revealed critical blind spots in our DDoS protection strategy. Within two weeks, we went from a high-risk posture to industry-best practices. The detailed remediation steps and CLI commands made implementation straightforward."