The Engineering Behind DDactic
A distributed DDoS resilience testing platform built across 19 cloud providers, processing industry-wide vulnerability assessments at scale. This is what makes it hard to replicate.
19-Platform Cloud Orchestration
Most security platforms use one, maybe two cloud providers. DDactic deploys bot instances across 19 cloud platforms simultaneously through a single Go-based Deploy Service. Each platform has a dedicated adapter handling authentication, API differences, region selection, and snapshot management.
This isn't a wrapper around Terraform. It's a purpose-built deployment engine that handles platform-specific quirks: OVH's OpenStack metadata colliding with AWS at 169.254.169.254, Scaleway's cloud-init not running on snapshot instances, IBM requiring VPC infrastructure pre-provisioning, Tencent's mainland China regions being GFW-blocked.
Self-Healing Spot Instance Fleet
Spot instances save 60-90% on compute costs but can be reclaimed at any time. The Spot Monitor polls all 5 spot-capable platforms every 60 seconds through the Deploy Service's /status/instances endpoint, detects terminations, and automatically provisions replacements.
The replacement instance is deployed on the same platform with the same configuration, including the spot flag, so it's also a spot instance. The bot downloads its binary, auto-detects its platform, registers with C2C, and rejoins the fleet. Total recovery: under 75 seconds.
Residential Proxy Escalation
Certificate Transparency logs (crt.sh) are a critical intelligence source but aggressively rate-limit datacenter IPs. DDactic routes these queries through a residential IP connection: a proxy running on a real ISP line, tunneled through Cloudflare Tunnel for encryption and reliability.
The backend automatically escalates to the residential proxy when datacenter requests fail. Results are cached in S3 with 24-hour TTL, so each domain is only queried once per day regardless of how many scans reference it.
↓ crt.sh blocked from datacenter
Dedibox Backend API
↓ HTTPS to proxy.ddactic.net
Cloudflare Tunnel
↓ encrypted tunnel
Residential ISP PC
↓ real residential IP
crt.sh responds
• crt.sh rate limits to ~1 req/sec from any IP
• Datacenter IPs face additional throttling
• Residential IPs get preferential treatment
• CF Tunnel provides encryption + reliability
• 24h S3 cache prevents redundant queries
• Scanner polls S3 while backend pre-fetches async
3-Stage Reconnaissance Pipeline
The scanner runs as a Docker container on AWS Batch. Three sequential stages build a complete picture of the target's attack surface. Stage 3 runs 5 specialized L7 tools in parallel, each using evasion techniques like uTLS fingerprinting and randomized cipher suites to avoid detection.
Industry-Wide Batch Intelligence
Beyond individual customer scans, DDactic maintains vulnerability intelligence across 19 industries. Pre-configured company lists enable batch scanning of hundreds of companies simultaneously via AWS Batch parallelization. This produces competitive benchmarks and market-wide protection assessments.
Load-Balanced Fleet Controllers with HTTP/2
Two Fleet Controllers behind an AWS Application Load Balancer handle fleet coordination. Bots communicate over HTTP/2 through Cloudflare-proxied DNS, so the Fleet Controller infrastructure benefits from Cloudflare's DDoS protection. Each bot self-identifies its platform, IP, and capabilities on registration.
Physical Device Labs
Web scanners miss mobile and desktop application endpoints. DDactic operates physical device labs that intercept real application traffic via MITM proxies, discovering API endpoints, WebSocket connections, gRPC channels, and telemetry backends that are invisible to traditional reconnaissance.
Vendor-Specific Hardening Engine
The platform generates copy-paste CLI commands tailored to the customer's CDN/WAF vendor. 16 hardening templates across 6 vendors, with optional credential injection from the customer's stored integrations. Before-test and after-test recommendation sets ensure the right fixes at the right time.
| Template | Cloudflare | AWS | GCP | Azure | Akamai |
|---|---|---|---|---|---|
| Rate Limiting | API + CLI | WAFv2 | Cloud Armor | Front Door | Property Mgr |
| WAF Rules | Managed | OWASP Set | Pre-config | WAF Policy | App & API |
| TLS Hardening | Min TLS | ACM Policy | SSL Policy | TLS Config | Edge Cert |
| DDoS Config | Sec Level | Shield | Armor | DDoS Plan | Kona Site |
| Bot Mgmt | Bot Fight | Bot Control | reCAPTCHA | Bot Mgr | Bot Mgr |
| Geo Blocking | Firewall | WAF Geo | Armor Geo | Geo Filter | Edge Logic |
Why This Is Hard to Replicate
Each component is individually achievable. The moat is the integration: making 19 cloud APIs, 9 intelligence sources, 5 L7 recon tools, physical device labs, self-healing spot fleets, and vendor-specific hardening work as a single automated pipeline.