FortiDeceptor decoys
FortiDeceptor creates a network of decoys to lure attackers and monitor their activities on the network. When a hacker attacks a decoy, an alert is generated, and their malicious activities are captured and analyzed in real-time. This analysis generates a mitigation and remediation response that protects the network.
- Decoys
- Decoy Operating Systems (OS)
- Application decoys
- Lure services by OS
- IP address capacity
- Decoy services details
Decoys
The following table shows the current list of FortiDeceptor decoy and services.
|
IT Decoys |
IoT Decoys |
OT Decoys |
APP Decoys |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Printers
IP Camera
Network devices
Medical decoys
Bank Decoys
|
Note: OT Decoys are only supported in SCADA v3 OS.
|
|
Decoy Operating Systems (OS)
The current FortiDeceptor decoy OS are:
|
Customized Linux |
Red Hat 7.9, Red Hat 8, Red Hat 9, Ubuntu20.04 Server |
|
Customized Windows |
Windows 10, Windows 11 version 23H2, Windows Server 2016, Windows Server 2019, Windows Server 2022, French Windows 10, French Windows Server 2016. NOTE: Windows 11 version 24H2 is not supported. |
| IoT/OT |
SCADA version 3, Medical OS, IoT OS, and VoIP version1. |
| Linux |
Ubuntu Desktop, CentOS, ESXi server, FV-CPO |
| VPN |
Fortinet SSL-VPN (FG-60F, FG-100F, FG-1500D, FG-2000E, FG-3700D) |
| Windows |
Windows 7, Windows 10, Windows 10ltsc2021v1 |
Application decoys
The current FortiDeceptor application decoys are:
- POS OS, ERP OS PACS and SAP
Lure services by OS
For a description of each lure service, see Decoy Operating Systems (OS).
The current FortiDeceptor lure services are:
|
Customized Linux |
HTTP, HTTPS, GIT, SAMBA, SSH, SMTP, TCPListener, FTP, RADIUS, ICMP |
|
Customized Windows |
RDP, SMB, NBNSSpoofSpotter, MSSQL, IIS (HTTP/HTTPS), ICMP, TCPListener, SMTP, SWIFT Lite2 and FTP |
| IoT/OT |
HTTP, FTP, TFTP, SNMP, MODBUS, S7COMM, BACNET, IPMI, TRICONEX, ENIP, Kamstrup, DNP3, Telnet, PACS-WEB, PACS, DICOM server, Infusion Pump (TELNET), Infusion Pump (FTP), POS-WEB, ERP-WEP, GUARDIAN-AST, IEC104, Jetdirect, Printer-WEB, IP Camera-WEB, UPnP, RTSP, CDP, TP-link WEB, CWMP, SAP DISPATCHER, SAP WEB, MOXA, MQTT WEB, CoAP, SIP, and XMPP WEB |
| Linux |
SSH, SAMBA, TCPListener, HTTP, HTTPS, GIT, ICMP and FTP |
| SSL VPN |
HTTPS |
| Windows |
RDP, SMB, TCPListener, NBNSSpoofSpotter, ICMP, FTP, SMTP, SWIFT Lite2. Does not contain (Windows 7. |
IP address capacity
The current FortiDeceptor IP address capacity are:
- A single FDC 1KG can host up to 20 deception VMs.
- A single FDC VMs can host up to 20 deception VMs.
- A single deception VM supports up to 24 IP addresses or decoys. Each IP represents a decoy.
- A single FortiDeceptor appliance (HW/VM) can support up to 480 IP addresses.
- A single FortiDeceptor appliance (HW/VM) can support up to 128 segments (VLANS).
|
|
VPN only supports 8 IPs. Cisco Decoy only supports 1VLAN. |
Decoy services details
|
Service |
Description |
|---|---|
|
BACNET |
Enable this service to capture attacks through BACNET on the default BACNET port. |
|
CDP |
Enable this service to allow the decoy VM to send CDP traffic within the network. |
| CoAP |
|
|
CWMP |
Enable this service to send data using CWMP protocol to {ip}:{port}/cpe. |
|
DICOM Server service |
|
|
DNP3 |
Enable this service to capture attacks through DNP3 on the default DNP3 port. |
|
Elastic Search |
|
|
ENIP service |
|
|
ERP-WEB service |
|
|
FTP service |
|
|
GIT |
|
|
Guardian-AST service |
|
|
GTP-U |
|
|
HTTP service |
|
|
HTTPS |
|
|
ICMP |
|
| IEC104 service | Enable this to service capture attacks through IEC104 on the default IEC104 port. |
|
Infusion Pump (FTP) |
|
|
Infusion Pump (Telnet) service |
|
|
Infusion Pump (Telnet) service |
|
|
IP Camera-WEB |
|
|
IPMI service |
|
|
Jetdirect |
|
|
KAMSTRUP service |
|
|
Lantronix Discovery Protocol service |
|
|
MariaDB |
|
|
MODBUS |
Enable this service to capture attacks through MODBUS on the default MODBUS port. |
| MOXA |
|
| MQTT WEB |
|
|
NBNSSpoofSpotter |
|
| NextEPC WEB | Enable this service to capture attacks through NextEPC WEB on the default port. Supports adding User/Password. |
|
PACS service |
|
|
PACS-WEB service |
|
|
POS-WEB service |
|
|
Printer-WEB |
A web GUI that simulates the administration GUI of Lexmark MX410de printer. |
| PROFINET service | Enable this service to capture attacks through PROFINET |
|
RADIUS |
centosv1 Decoy
Linux Decoy (Ubuntu16v2)
|
|
RDP |
Customized Windows Decoys:
|
|
Router Running-Config (optional) |
Allows you to upload a customized Cisco config file to predefine the Cisco router setting |
|
RTSP service |
Example: To infinitely loop a video: From the attacker perspective, the live camera stream is available at |
|
S7COMM service |
|
|
SAMBA |
Enable this service to capture attacks through SMB on the default SMB port. |
|
SAP DISPATCHER |
|
|
SAP ROUTER |
|
|
SAP WEB |
A fake SAP HTTP and HTTPS GUI for SAP Fiori Launchpad or Legacy WebGUI. |
| SIP |
|
|
SMB |
Customized Windows Decoys:
|
|
SMTP |
|
|
SNMP |
|
|
SSH |
|
|
SSLVPN |
|
| SWIFT Lite2 |
|
|
TCPListener |
|
| Telnet service |
MikroTik Router DecoyA login-required service that enables attackers to utilize all MikroTik router functions. MikroTik Router DecoyA login-required service that enables attackers to utilize all MikroTik router functions. MOXA NPORT 5110 decoy
Schneider SCADAPack 333E decoyLogin-required telnet service simulates SCADAPack E Smart RTU command line environment. |
| TFTP | Enable this to service capture attacks through TFTP on the default TFTP port |
|
TP-LINK WEB |
Enable this service to allow attackers to login to a fake TP-link setting site. |
|
TRICONEX service |
|
|
UPnP service |
|
|
VNC |
|
| XMPP WEB |
|