FortiDeceptor decoys
FortiDeceptor creates a network of decoys to lure attackers and monitor their activities on the network. When a hacker attacks a decoy, an alert is generated and their malicious activities are captured and analyzed in real-time. This analysis generates a mitigation and remediation response that protects the network.
- Decoys
- Decoy Operating Systems (OS)
- Application decoys
- Lure services by OS
- IP address capacity
- Decoy services details
Decoys
The following table shows the current list of FortiDeceptor decoy and services.
|
IT Decoys |
IoT Decoys |
OT Decoys |
APP Decoys |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Printers
IP Camera
Network devices
Medical decoys
Bank Decoys
|
Note: OT Decoys are only supported in SCADA v3 OS.
|
|
Decoy Operating Systems (OS)
The current FortiDeceptor decoy OS are:
|
Customized Linux |
Red Hat 7.9, Red Hat 8, Red Hat 9, Ubuntu20.04 Server |
|
Customized Windows |
Windows 10, Windows 11, Windows Server 2016, Windows Sever 2019, Windows Sever 2022, French Windows 10, French Windows Server 2016 |
| IoT/OT |
SCADA version 3, Medical OS, IoT OS, and VoIP version1. |
| Linux |
Ubuntu Desktop, CentOS, ESXi server, FV-CPO |
| VPN |
Fortinet SSL-VPN (FG-60E, FG-100F, FG-1500D, FG-2000E, FG-3700D) |
| Windows |
Windows 7, Windows 10, Windows 10ltsc2021v1 |
Application decoys
The current FortiDeceptor application decoys are:
- POS OS, ERP OS PACS and SAP
Lure services by OS
For a description of each lure service, see Decoy Operating Systems (OS).
The current FortiDeceptor lure services are:
|
Customized Linux |
HTTP, HTTPS, GIT, SAMBA, SSH, SMTP, TCPListener, FTP, RADIUS, ICMP |
|
Customized Windows |
RDP, SMB, NBNSSpoofSpotter, MSSQL, IIS (HTTP/HTTPS), ICMP, TCPListener, SMTP, SWIFT Lite2 and FTP |
| IoT/OT |
HTTP, FTP, TFTP, SNMP, MODBUS, S7COMM, BACNET, IPMI, TRICONEX, ENIP, Kamstrup, DNP3, Telnet, PACS-WEB, PACS, DICOM server, Infusion Pump (TELNET), Infusion Pump (FTP), POS-WEB, ERP-WEP, GUARDIAN-AST, IEC104, Jetdirect, Printer-WEB, IP Camera-WEB, UPnP, RTSP, CDP, TP-link WEB, CWMP, SAP DISPATCHER, SAP WEB, MOXA, MQTT WEB, CoAP, SIP, and XMPP WEB |
| Linux |
SSH, SAMBA, TCPListener, HTTP, HTTPS, GIT, ICMP and FTP |
| SSL VPN |
HTTPS |
| Windows |
RDP, SMB, TCPListener, NBNSSpoofSpotter, ICMP, FTP, SMTP, SWIFT Lite2. Does not contain (Windows 7. |
IP address capacity
The current FortiDeceptor IP address capacity are:
- A single FDCIKG can host up to 20 deception VMs.
- A single FDCVMS can host up to 20 deception VMs.
- A single deception VM supports up to 24 IP addresses or decoys. Each IP represents a decoy.
- A single FortiDeceptor appliance (HW/VM) can support up to 480 IP addresses.
- A single FortiDeceptor appliance (HW/VM) can support up to 128 segments (VLANS).
|
|
VPN only supports 8 IPs. Cisco Decoy only supports 1VLAN. |
Decoy services details
|
Service |
Description |
|---|---|
|
BACNET |
Enable this service to capture attacks through BACNET on the default BACNET port. |
|
CDP |
Enable this service to allow the decoy VM to send CDP traffic within the network. |
| CoAP |
|
|
CWMP |
Enable this service to send data using CWMP protocol to {ip}:{port}/cpe. |
|
DICOM Server service |
|
|
DNP3 |
Enable this service to capture attacks through DNP3 on the default DNP3 port. |
|
Elastic Search |
|
|
ENIP service |
|
|
ERP-WEB service |
|
|
FTP service |
|
|
GIT |
|
|
Guardian-AST service |
|
|
GTP-U |
|
|
HTTP service |
|
|
HTTPS |
|
|
ICMP |
|
| IEC104 service | Enable this to service capture attacks through IEC104 on the default IEC104 port. |
|
Infusion Pump (FTP) |
|
|
Infusion Pump (Telnet) service |
|
|
Infusion Pump (Telnet) service |
|
|
IP Camera-WEB |
|
|
IPMI service |
|
|
Jetdirect |
|
|
KAMSTRUP service |
|
|
Lantronix Discovery Protocol service |
|
|
MariaDB |
|
|
MODBUS |
Enable this service to capture attacks through MODBUS on the default MODBUS port. |
| PROFINET service |
|
| MQTT WEB |
|
|
NBNSSpoofSpotter |
|
| NextEPC WEB | Enable this service to capture attacks through NextEPC WEB on the default port. Supports adding User/Password. |
|
PACS service |
|
|
PACS-WEB service |
|
|
POS-WEB service |
|
|
Printer-WEB |
A web GUI that simulates the administration GUI of Lexmark MX410de printer. |
| PROFINET service | Enable this service to capture attacks through PROFINET |
|
RADIUS |
centosv1 Decoy
Linux Decoy (Ubuntu16v2)
|
|
RDP |
|
|
Router Running-Config (optional) |
Allows you to upload a customized Cisco config file to predefine the Cisco router setting |
|
RTSP service |
Example: To infinitely loop a video: From the attacker perspective, the live camera stream is available at |
|
S7COMM service |
|
|
SAMBA |
Enable this service to capture attacks through SMB on the default SMB port. |
|
SAP DISPATCHER |
|
|
SAP ROUTER |
|
|
SAP WEB |
A fake SAP HTTP and HTTPS GUI for SAP Fiori Launchpad or Legacy WebGUI. |
| SIP |
|
|
SMB |
Customized Windows 10 Decoy
Windows 11 Decoy
Customized Windows Server 2016 Decoy
Customized Windows Server 2019 Decoy
Customized Windows Server 2022 Decoy
Customized French Windows 10 Decoy
Customized French Windows Server 2016 Decoy
|
|
SMTP |
|
|
SNMP |
|
|
SSH |
|
|
SSLVPN |
|
| SWIFT Lite2 |
|
|
TCPListener |
|
| Telnet service |
MikroTik Router DecoyA login-required service that enables attackers to utilize all MikroTik router functions. MikroTik Router DecoyA login-required service that enables attackers to utilize all MikroTik router functions. MOXA NPORT 5110 decoy
Schneider SCADAPack 333E decoyLogin-required telnet service simulates SCADAPack E Smart RTU command line environment. |
| TFTP | Enable this to service capture attacks through TFTP on the default TFTP port |
|
TP-LINK WEB |
Enable this service to allow attackers to login to a fake TP-link setting site. |
|
TRICONEX service |
|
|
UPnP service |
|
|
VNC |
|
| XMPP WEB |
|