Fortinet white logo
Fortinet white logo

Administration Guide

FortiDeceptor decoys

FortiDeceptor decoys

FortiDeceptor creates a network of decoys to lure attackers and monitor their activities on the network. When a hacker attacks a decoy, an alert is generated, and their malicious activities are captured and analyzed in real-time. This analysis generates a mitigation and remediation response that protects the network.

Decoys

The following table shows the current list of FortiDeceptor decoy and services.

IT Decoys

IoT Decoys

OT Decoys

APP Decoys

CentOS 7.9

SSH, SAMBA, SMTP, TCP, HTTP, HTTPS, GIT, FTP, RADIUS

Custom Redhat 7.9/8.8/8.10/9.4/9.6
SSH, SAMBA, SMTP, TCP, HTTP, HTTPS, GIT, FTP, RADIUS

Custom Win 10 / 11

RDP, SMB, MSSQL, SMTP, TCP, NBNS, ICMP, FTP, SWIFT

Custom Win Server 2016/2019/2022

RDP, SMB, IIS, MSSQL, TCP, NBNS, ICMP, FTP, SWIFT

Custom Debian 11.7/11.9

Custom Debian 11.7/11.9 SSH, SAMBA, HTTP, HTTPS, GIT, SMTP, TCP, FTP, RADIUS

Custom Ubuntu 20.04

SSH, SAMBA, HTTP, HTTPS, GIT, SMTP, TCP, FTP, RADIUS

ESXI Decoy

HTTP, HTTPS, SSH

FortiGate

SSLVPN, HTTPS

Ubuntu 20.04

SSH, SAMBA, SMTP, TCP, HTTP, HTTPS, GIT, FTP, RADIUS, VNC

Windows 7

RDP, SMB, SMTP, TCP, NBNS, ICMP, FTP

Windows 10v1 / 10-2021

RDP, SMB, SMTP, TCP, NBNS, ICMP, FTP, SWIFT

Printers

Brother MFC Printer

SNMP, HTTP, Jetdirect

HP Printer Decoy

SNMP, HTTP, Jetdirect

Lexmark Printer Decoy

SNMP, HTTP, Jetdirect

IP Camera

Hikvision IP camera

SNMP, HTTP, RTSP, UPnP
Network devices

Cisco Router Decoy

TELNET, HTTP, SNMP, CDP

Cisco models
  • 4 Cisco images (models) are supported: 2691, 3660, 3725 and 3745.
  • An error is displayed if you upload an image that is not supported.

MikroTik Router

SNMP, TELNET, CDP, HTTP

NetGear MR60 Router Decoy

HTTP, SNMP, UPnP

Switch Decoy

SNMP, TELNET, CDP, HTTP

TP-LINK Router Decoy

CWMP, HTTP, TP-LINK WEB
Medical decoys

INFUSOMAT Decoy

HTTP, HTTPS, CanBus, B.BRAUN

PACS Decoy

TELNET, FTP, PACS, PACS-WEB, DICOM Server

SPACECOM Decoy

HTTP, HTTPS, FTP, CANBus, SSH

Bank Decoys

SWIFT VPN Gateway

TELNET, HTTPS

Note: OT Decoys are only supported in SCADA v3 OS.

Ascent Compass MNG

HTTP, FTP, SNMP, BACNET

C-More HMI

SNMP, HTTP, HTTPS, FTP

Emerson iPro by Dixell

SNMP, MODBUS, HTTP

GE PLC 90

SNMP, HTTP, SRTP

Guardian AST

Guardian-AST/no-port

IPMI Device

HTTP, FTP, SNMP, IPMI

Kamstrup 382

KAMSTRUP

Lantronix XPORT V1.8

SNMP, HTTP, Lantronix/no-port

Lantronix XPORT V2.0

SNMP, HTTP, Lantronix/no-port

Liebert Spruce UPS

TFTP, SNMP, HTTP

MOXA NPORT 5110

SNMP, TELNET, HTTP, MOXA

Modicon M241

TFTP, SNMP, MODBUS, ENIP, HTTP

Modicon M580

TFTP, SNMP, MODBUS, ENIP, HTTP

Niagara4 Station

SNMP, HTTP, BACNET

NiagaraAX Station

SNMP, HTTP, BACNET

Phoenix contact AXC 1050

HTTP, SNMP, PROFINET, FTP

PowerLogic ION7650

SNMP, MODBUS, DNP3, HTTP

Rockwell 1769-L16ER/B LOGIX5316ER

SNMP, ENIP, HTTP

Rockwell 1769-L35E Ethernet Port

SNMP, ENIP, HTTP

Rockwell PLC

HTTP, TFTP, SNMP, ENIP

SIEMENS S7-1500 PLC

HTTP, TFTP, SNMP, S7COMM, IEC104, PROFINET

Schneider EcoStruxure BMS server

SNMP, BACNET, HTTP, TRICONEX

Schneider Power Meter - PM5560

SNMP, BACNET, ENIP, HTTP, DNP3

Schneider SCADAPack 333E

SNMP, DNP3, TELNET

Siemens S7-200 PLC

HTTP, TFTP, SNMP, MODBUS, S7COMM

Siemens S7-300 PLC

TFTP, SNMP, IEC104)

VAV-DD BACnet controller

SNMP, BACNET

ERP Decoy

ERP-WEB/HTTP

POS Decoy

POS-WEB / HTTP

SAP Decoy

SAP Router, SAP Dispatcher, HTTP

Elastic Search

Elastic Search

ScadaBR Decoy

ScadaBR-HTTP)

Tomcat Decoy

HTTP, HTTPS, SSH

MySql MariaDB Decoy

SSH, MariaDB

VOIP: SIP Decoy

SIP/TCP, UDP

XMPP Decoy

XMPP/ HTTP

MQTT Decoy

MQTT/HTTP, CoAP

4G/5G 3GPP Decoy

NextEPC/HTTP, SCTP&GTP-C, GTP-U

Mac Decoy

SSH, VNC

Webmin Decoy

HTTP, HTTPS

Citrix ADC Decoy

HTTP, HTTPS

Citrix Application Delivery Management Decoy

HTTP, HTTPS

Citrix Receiver Decoy

HTTP, HTTPS

Citrix Endpoint Management Decoy

HTTP, HTTPS

Citrix DMZ Decoy

HTTP, HTTPS

Nginx Decoy

HTTP, HTTPS

EV-CPO Decoy

HTTP, HTTPS

TrueNAS Decoy

SSH, HTTP, HTTPS, SAMBA, SNMP

Decoy Operating Systems (OS)

The current FortiDeceptor decoy OS are:

Customized Linux

Debian 11, Red Hat 7.9, Red Hat 8, Red Hat 9, Ubuntu20.04 Server

Customized Windows

Windows 10, Windows 11 version 23H2, Windows Server 2016, Windows Server 2019, Windows Server 2022, French Windows 10, French Windows Server 2016. For detailed information, see Custom Decoy Image

NOTE: Windows 11 version 24H2 is not supported.

IoT/OT

SCADA version 3, Medical OS, IoT OS, and VoIP version1.

Linux

Ubuntu Desktop, CentOS, ESXi server, FV-CPO

VPN

Fortinet SSL-VPN (FG-60F, FG-100F, FG-1500D, FG-2000E, FG-3700D)

Windows

Windows 7, Windows 10, Windows 10ltsc2021v1

Application decoys

The current FortiDeceptor application decoys are:
  • POS OS, ERP OS PACS and SAP

Lure services by OS

For a description of each lure service, see Decoy Operating Systems (OS).

The current FortiDeceptor lure services are:

Customized Linux

HTTP, HTTPS, GIT, SAMBA, SSH, SMTP, TCPListener, FTP, RADIUS, ICMP

Customized Windows

RDP, SMB, NBNSSpoofSpotter, MSSQL, IIS (HTTP/HTTPS), ICMP, TCPListener, SMTP, SWIFT Lite2 and FTP

IoT/OT

HTTP, FTP, TFTP, SNMP, MODBUS, S7COMM, BACNET, IPMI, TRICONEX, ENIP, Kamstrup, DNP3, Telnet, PACS-WEB, PACS, DICOM server, Infusion Pump (TELNET), Infusion Pump (FTP), POS-WEB, ERP-WEP, GUARDIAN-AST, IEC104, Jetdirect, Printer-WEB, IP Camera-WEB, UPnP, RTSP, CDP, TP-link WEB, CWMP, SAP DISPATCHER, SAP WEB, MOXA, MQTT WEB, CoAP, SIP, and XMPP WEB

Linux

SSH, SAMBA, TCPListener, HTTP, HTTPS, GIT, ICMP and FTP

SSL VPN

HTTPS

Windows

RDP, SMB, TCPListener, NBNSSpoofSpotter, ICMP, FTP, SMTP, SWIFT Lite2. Does not contain (Windows 7.

IP address capacity

The current FortiDeceptor IP address capacity are:
  • A single FDC 1KG can host up to 20 deception VMs.
  • A single FDC VMs can host up to 20 deception VMs.
  • A single deception VM supports up to 24 IP addresses or decoys. Each IP represents a decoy.
  • A single FortiDeceptor appliance (HW/VM) can support up to 480 IP addresses.
  • A single FortiDeceptor appliance (HW/VM) can support up to 128 segments (VLANS).
Tooltip

VPN only supports 8 IPs.

Cisco Decoy only supports 1VLAN.

Decoy services details

Service

Description

BACNET

Enable this service to capture attacks through BACNET on the default BACNET port.

CDP

Enable this service to allow the decoy VM to send CDP traffic within the network.

CoAP
  • Enable this to service capture attacks through CoAP on the default CoAP port.
  • Download libcoap from GitHub is required. Go to https://github.com/miri64/libcoap and follow the command libcoap command rule.

CWMP

Enable this service to send data using CWMP protocol to {ip}:{port}/cpe.

DICOM Server service

  • Server port can be adjusted

  • Server name can be adjusted

  • DICOM operations (e.g. C-STORE, C-FIND) are supported

DNP3

Enable this service to capture attacks through DNP3 on the default DNP3 port.

Elastic Search

  • ES port can be adjusted, and the user-defined port will be used for HTTP REST API calls to interact with the Elasticsearch cluster.
  • ES node name is to define a unique identifier for the default created node with in the Cluster. Decoy hostname will be used if empty.
  • ES cluster name is required to setup the decoy.

ENIP service

  • Enable this service to capture attack through ENIP on the default ENIP port.

  • ENIP serial number is user-defined.

ERP-WEB service

  • Login-required web GUI simulates ERP website

  • Port can be adjusted

FTP service

  • Enable this service to capture attacks through FTP on the default FTP port.

  • FTP port can be adjusted.

  • FTP banner is user-defined.

  • Enable Anonymous Access to allow files access through FTP without needing specific user credentials

GIT

  • HTTP port can be adjusted.
  • HTTPS port can be adjusted.
  • GIT Users are user-defined.
  • Git Repository Import is optional.

Guardian-AST service

  • Enable this service to simulate an AST’s satellite communications remote asset tracking system named Guardian.

  • To deploy a Guardian-AST decoy, this service must be enabled since it is the only service available

GTP-U

  • Enable the service to capture attacks through GTP-U.

HTTP service

  • Enable this service to capture attacks through HTTP on the default HTTP port.

  • Serial Number is user-defined.

HTTPS

  • Enable this service to capture attacks through HTTPS on the default HTTPS port.

ICMP

  • Enable this service to capture ping/attacks through ICMP.
IEC104 service Enable this to service capture attacks through IEC104 on the default IEC104 port.

Infusion Pump (FTP)

  • Simulates Infusion Pump (FTP)

  • A username/password is required to login.

Infusion Pump (Telnet) service

  • Simulates Infusion Pump (telnet)

  • A username/password is required to login.

Infusion Pump (Telnet) service

  • Simulates Infusion Pump (telnet)

  • A username/password is required to login.

IP Camera-WEB

  • A login-required service that displays videos to simulate IP cameras. Default videos are available. However, we strongly recommend uploading 1-8 .mp4 videos that fit best with the working environment.

IPMI service

  • Enable this service to capture attack through IPMI on the default IPMI port.

Jetdirect

  • Enable this service to open port 9100 on the decoy VM, and respond to PJL (Printer Job Language) requests.

KAMSTRUP service

  • Toggle to enable/disable this service. Enable this service to simulate a Kamstrup device

  • To deploy a KAMSTRUP decoy, this service must be enabled since it is the only service available

Lantronix Discovery Protocol service

  • This protocol allows the discovery of Lantronix devices using the Lantronix discovery protocol.

MariaDB

  • Enable this service to open the user defined port on the decoy VM and respond to MySQL database requests within the network.
  • Database name must match the name of database in the uploaded SQL schema.
  • Database content requires a SQL schema file for organizing database objects, providing a structured way to manage data and the relationships between different objects within the database system.

MODBUS

Enable this service to capture attacks through MODBUS on the default MODBUS port.

MOXA
MQTT WEB
  • Enable this service to capture attacks through MQTT WEB on the default MQTT WEB port.
  • Supports custom listening port. Default port is 18083.
  • Supports adding User/Password.

NBNSSpoofSpotter

  • Enable this service to capture attacks through NBNS (NetBIOS Name Service)
  • NBNS Username is user-defined.
  • NBNS Password is user-defined.
  • NBNS Domain is user-defined. (Not mandatory)
  • NBNS Hostname is user-defined.
  • Enable NBNS User Hostname: This allows the system to directly query the specified NBNS hostname.

  • Disable NBNS User Hostname: The system will generate fake hostnames based on the provided string.

  • NBNS Interval setting ranges from 60 to 3600, to manage the frequency of NBNS activities.
NextEPC WEB Enable this service to capture attacks through NextEPC WEB on the default port. Supports adding User/Password.

PACS service

  • A user-defined name for the PACS system.

PACS-WEB service

  • Login-required web GUI for PACS, with existing medical data

  • Port can be adjusted

POS-WEB service

  • Login-required web GUI simulate POS website

  • Port can be adjusted

Printer-WEB

A web GUI that simulates the administration GUI of Lexmark MX410de printer.

PROFINET service Enable this service to capture attacks through PROFINET

RADIUS

centosv1 Decoy
  • Enable this service to capture attacks through RADIUS.
  • Authentication port can be adjusted.
  • Accouting port can be adjusted.
  • FTP banner is user-defined.
  • Enable Anonymous Access to allow files access through FTP without needing specific user credentials
Linux Decoy (Ubuntu16v2)
  • Enable this service to capture attacks through RADIUS.
  • Authentication port can be adjusted.
  • Accounting port can be adjusted.
  • Secret Password is user-defined.

RDP

  • Enable this service to capture attacks through RDP on the default RDP port.

Customized Windows Decoys:

  • Enable this service to capture attacks through RDP on the default RDP port.
  • Automatically enable Allow domain user to access RDP to allow Active Directory (AD) user in RDP service,if the customized windows decoys have joined Active Directory (AD) domain during customization, and input AD user when deploy decoy.
  • Automatically enable Anti Deception Detection feature to allow AD lure users to dynamically login to AD Domain Server daily, if the customized windows decoys have joined Active Directory (AD) domain during customization, and input AD user when deploy decoy.

Router Running-Config (optional)

Allows you to upload a customized Cisco config file to predefine the Cisco router setting

RTSP service

  • When this service is enabled, you will also need to upload a video to a predefined location so the attacker can watch the video.

  • The RTSP port can be adjusted.

  • To upload the video, you can use ffmpeg, or any other method to infinitely loop a video so it is available to the attacker

Example:

To infinitely loop a video:sudo ffmpeg -re -stream_loop -1 -i {path_to_local_video} -c copy -f rtsp rtsp://{ip}:{port}/{name_you_choose};

From the attacker perspective, the live camera stream is available at rtsp://{ip}:{port}/{name_you_choose}

S7COMM service

  • Enable this service to capture attacks through S7COMM on the default S7COMM port.

  • Module Type is user-defined.

  • PLC Name is user-defined.

SAMBA

Enable this service to capture attacks through SMB on the default SMB port.

SAP DISPATCHER

  • Enable SAP DISPATCHER so SAP Logon can get responses from the SAP decoy.
  • Use the default port to ensure SAP Logon can connect.

SAP ROUTER

  • Enable SAP ROUTER Service so SAP Logon can configure the SAProuter String.
  • Use the default port to ensure SAP Logon can connect.

SAP WEB

A fake SAP HTTP and HTTPS GUI for SAP Fiori Launchpad or Legacy WebGUI.

SIP
  • Enable this service to capture attacks through MQTT WEB on the default SIP port.
  • Supports adding User/Password.
  • Users can connect to the SIP server from SIP client service (like Linphone) through UDP or TCP, and register an account, text message, voice call, and video call each other.

SMB

  • Enable this service to capture attacks through SMB on the default SMB port.

Customized Windows Decoys:

  • Enable this service to capture attacks through RDP on the default RDP port.
  • Automatically enable Allow domain user to access RDP to allow Active Directory (AD) user in RDP service,if the customized windows decoys have joined Active Directory (AD) domain during customization, and input AD user when deploy decoy.
  • Automatically enable Anti Deception Detection feature to allow AD lure users to dynamically login to AD Domain Server daily, if the customized windows decoys have joined Active Directory (AD) domain during customization, and input AD user when deploy decoy.

SMTP

  • Enable this service to capture attacks through SMTP (Simple Mail Transfer Protocol).
  • Listening port can be adjusted.
  • SMTP Domain is user-defined.
  • SMTP Banner is user-defined.
  • Enable Secure SMTP to activate TLS (Transport Layer Security) protocol on SMTP service.
  • Secure SMTP listening port can be adjusted.

  • Enable Anonymous Relay to allow anyone to send email to the decoy without requiring authentication.

SNMP

  • Enable this service to open port 161 on the decoy VM, and respond to SNMP (v1 or v2c) request from within the network.
  • Community name is user-defined.
  • SNMP response is customized for:
    • Brother MFC Printer decoy
    • Cisco router decoy
    • GE PLC decoy
    • HP printer decoy
    • HP switch decoy
    • IP camera decoy
    • IPMI Device decoy
    • IPMI Device decoy
    • Lexmark Printer decoy
    • Liebert Spruce UPS decoy
    • moxa nport 5110 decoy
    • Phoenix contact AXC 1050 decoy
    • PowerLogic ION7650 decoy
    • Rockwell 1769-L35E Ethernet Port decoy
    • Schneider Power Meter - PM5560 decoy
    • Schneider SCADAPack 333E decoy
    • Siemens Rockwell PLC decoy
    • Siemens S7-200 PLC decoy
    • Siemens S7-300 PLC decoy
    • Siemens S7-1500 PLC decoy
    • TrueNAS Decoy
    • VAV-DD BACNET controller decoy

SSH

  • Enable this service to open port 22 on the decoy VM and respond to SSH (Secure Shell) requests within the network.
  • SSH banner is user-defined.

SSLVPN

  • Enable this service to capture attacks through SSLVPN on the user-defined port.
SWIFT Lite2
  • Enable this service to activate SWIFT Lite2 on Windows 10 decoy.
  • MT file import is mandatory.

TCPListener

  • Enable this service to capture the port scan attacks on the customized port.
  • TCP banner is user-defined.
Telnet service
MikroTik Router Decoy

A login-required service that enables attackers to utilize all MikroTik router functions.

MikroTik Router Decoy

A login-required service that enables attackers to utilize all MikroTik router functions.

MOXA NPORT 5110 decoy
  • Login-required telnet service simulates moxa nport 5110 command line environment.
  • Two command choices: 1 and 2
Schneider SCADAPack 333E decoy

Login-required telnet service simulates SCADAPack E Smart RTU command line environment.

TFTP Enable this to service capture attacks through TFTP on the default TFTP port

TP-LINK WEB

Enable this service to allow attackers to login to a fake TP-link setting site.

TRICONEX service

  • Enable this service to capture attacks with the TRICONEX service.

UPnP service

  • Enable this service to open port 8080 on the decoy VM and simulate UPnP service.
  • A UPnP msg will broadcast within the network. Within the msg there is a URL for the attacker to download a .xml file showing device information.

VNC

  • Enable this service to capture remote control/support attacks through VNC (Virtual Network Computing) system.
XMPP WEB
  • Enable this service to capture attacks through XMPP WEB on the default XMPP WEB port.
  • Supports custom listening port (default port is 5280).
  • Supports adding User/Password.
  • Can be reached through HTTP.

FortiDeceptor decoys

FortiDeceptor decoys

FortiDeceptor creates a network of decoys to lure attackers and monitor their activities on the network. When a hacker attacks a decoy, an alert is generated, and their malicious activities are captured and analyzed in real-time. This analysis generates a mitigation and remediation response that protects the network.

Decoys

The following table shows the current list of FortiDeceptor decoy and services.

IT Decoys

IoT Decoys

OT Decoys

APP Decoys

CentOS 7.9

SSH, SAMBA, SMTP, TCP, HTTP, HTTPS, GIT, FTP, RADIUS

Custom Redhat 7.9/8.8/8.10/9.4/9.6
SSH, SAMBA, SMTP, TCP, HTTP, HTTPS, GIT, FTP, RADIUS

Custom Win 10 / 11

RDP, SMB, MSSQL, SMTP, TCP, NBNS, ICMP, FTP, SWIFT

Custom Win Server 2016/2019/2022

RDP, SMB, IIS, MSSQL, TCP, NBNS, ICMP, FTP, SWIFT

Custom Debian 11.7/11.9

Custom Debian 11.7/11.9 SSH, SAMBA, HTTP, HTTPS, GIT, SMTP, TCP, FTP, RADIUS

Custom Ubuntu 20.04

SSH, SAMBA, HTTP, HTTPS, GIT, SMTP, TCP, FTP, RADIUS

ESXI Decoy

HTTP, HTTPS, SSH

FortiGate

SSLVPN, HTTPS

Ubuntu 20.04

SSH, SAMBA, SMTP, TCP, HTTP, HTTPS, GIT, FTP, RADIUS, VNC

Windows 7

RDP, SMB, SMTP, TCP, NBNS, ICMP, FTP

Windows 10v1 / 10-2021

RDP, SMB, SMTP, TCP, NBNS, ICMP, FTP, SWIFT

Printers

Brother MFC Printer

SNMP, HTTP, Jetdirect

HP Printer Decoy

SNMP, HTTP, Jetdirect

Lexmark Printer Decoy

SNMP, HTTP, Jetdirect

IP Camera

Hikvision IP camera

SNMP, HTTP, RTSP, UPnP
Network devices

Cisco Router Decoy

TELNET, HTTP, SNMP, CDP

Cisco models
  • 4 Cisco images (models) are supported: 2691, 3660, 3725 and 3745.
  • An error is displayed if you upload an image that is not supported.

MikroTik Router

SNMP, TELNET, CDP, HTTP

NetGear MR60 Router Decoy

HTTP, SNMP, UPnP

Switch Decoy

SNMP, TELNET, CDP, HTTP

TP-LINK Router Decoy

CWMP, HTTP, TP-LINK WEB
Medical decoys

INFUSOMAT Decoy

HTTP, HTTPS, CanBus, B.BRAUN

PACS Decoy

TELNET, FTP, PACS, PACS-WEB, DICOM Server

SPACECOM Decoy

HTTP, HTTPS, FTP, CANBus, SSH

Bank Decoys

SWIFT VPN Gateway

TELNET, HTTPS

Note: OT Decoys are only supported in SCADA v3 OS.

Ascent Compass MNG

HTTP, FTP, SNMP, BACNET

C-More HMI

SNMP, HTTP, HTTPS, FTP

Emerson iPro by Dixell

SNMP, MODBUS, HTTP

GE PLC 90

SNMP, HTTP, SRTP

Guardian AST

Guardian-AST/no-port

IPMI Device

HTTP, FTP, SNMP, IPMI

Kamstrup 382

KAMSTRUP

Lantronix XPORT V1.8

SNMP, HTTP, Lantronix/no-port

Lantronix XPORT V2.0

SNMP, HTTP, Lantronix/no-port

Liebert Spruce UPS

TFTP, SNMP, HTTP

MOXA NPORT 5110

SNMP, TELNET, HTTP, MOXA

Modicon M241

TFTP, SNMP, MODBUS, ENIP, HTTP

Modicon M580

TFTP, SNMP, MODBUS, ENIP, HTTP

Niagara4 Station

SNMP, HTTP, BACNET

NiagaraAX Station

SNMP, HTTP, BACNET

Phoenix contact AXC 1050

HTTP, SNMP, PROFINET, FTP

PowerLogic ION7650

SNMP, MODBUS, DNP3, HTTP

Rockwell 1769-L16ER/B LOGIX5316ER

SNMP, ENIP, HTTP

Rockwell 1769-L35E Ethernet Port

SNMP, ENIP, HTTP

Rockwell PLC

HTTP, TFTP, SNMP, ENIP

SIEMENS S7-1500 PLC

HTTP, TFTP, SNMP, S7COMM, IEC104, PROFINET

Schneider EcoStruxure BMS server

SNMP, BACNET, HTTP, TRICONEX

Schneider Power Meter - PM5560

SNMP, BACNET, ENIP, HTTP, DNP3

Schneider SCADAPack 333E

SNMP, DNP3, TELNET

Siemens S7-200 PLC

HTTP, TFTP, SNMP, MODBUS, S7COMM

Siemens S7-300 PLC

TFTP, SNMP, IEC104)

VAV-DD BACnet controller

SNMP, BACNET

ERP Decoy

ERP-WEB/HTTP

POS Decoy

POS-WEB / HTTP

SAP Decoy

SAP Router, SAP Dispatcher, HTTP

Elastic Search

Elastic Search

ScadaBR Decoy

ScadaBR-HTTP)

Tomcat Decoy

HTTP, HTTPS, SSH

MySql MariaDB Decoy

SSH, MariaDB

VOIP: SIP Decoy

SIP/TCP, UDP

XMPP Decoy

XMPP/ HTTP

MQTT Decoy

MQTT/HTTP, CoAP

4G/5G 3GPP Decoy

NextEPC/HTTP, SCTP&GTP-C, GTP-U

Mac Decoy

SSH, VNC

Webmin Decoy

HTTP, HTTPS

Citrix ADC Decoy

HTTP, HTTPS

Citrix Application Delivery Management Decoy

HTTP, HTTPS

Citrix Receiver Decoy

HTTP, HTTPS

Citrix Endpoint Management Decoy

HTTP, HTTPS

Citrix DMZ Decoy

HTTP, HTTPS

Nginx Decoy

HTTP, HTTPS

EV-CPO Decoy

HTTP, HTTPS

TrueNAS Decoy

SSH, HTTP, HTTPS, SAMBA, SNMP

Decoy Operating Systems (OS)

The current FortiDeceptor decoy OS are:

Customized Linux

Debian 11, Red Hat 7.9, Red Hat 8, Red Hat 9, Ubuntu20.04 Server

Customized Windows

Windows 10, Windows 11 version 23H2, Windows Server 2016, Windows Server 2019, Windows Server 2022, French Windows 10, French Windows Server 2016. For detailed information, see Custom Decoy Image

NOTE: Windows 11 version 24H2 is not supported.

IoT/OT

SCADA version 3, Medical OS, IoT OS, and VoIP version1.

Linux

Ubuntu Desktop, CentOS, ESXi server, FV-CPO

VPN

Fortinet SSL-VPN (FG-60F, FG-100F, FG-1500D, FG-2000E, FG-3700D)

Windows

Windows 7, Windows 10, Windows 10ltsc2021v1

Application decoys

The current FortiDeceptor application decoys are:
  • POS OS, ERP OS PACS and SAP

Lure services by OS

For a description of each lure service, see Decoy Operating Systems (OS).

The current FortiDeceptor lure services are:

Customized Linux

HTTP, HTTPS, GIT, SAMBA, SSH, SMTP, TCPListener, FTP, RADIUS, ICMP

Customized Windows

RDP, SMB, NBNSSpoofSpotter, MSSQL, IIS (HTTP/HTTPS), ICMP, TCPListener, SMTP, SWIFT Lite2 and FTP

IoT/OT

HTTP, FTP, TFTP, SNMP, MODBUS, S7COMM, BACNET, IPMI, TRICONEX, ENIP, Kamstrup, DNP3, Telnet, PACS-WEB, PACS, DICOM server, Infusion Pump (TELNET), Infusion Pump (FTP), POS-WEB, ERP-WEP, GUARDIAN-AST, IEC104, Jetdirect, Printer-WEB, IP Camera-WEB, UPnP, RTSP, CDP, TP-link WEB, CWMP, SAP DISPATCHER, SAP WEB, MOXA, MQTT WEB, CoAP, SIP, and XMPP WEB

Linux

SSH, SAMBA, TCPListener, HTTP, HTTPS, GIT, ICMP and FTP

SSL VPN

HTTPS

Windows

RDP, SMB, TCPListener, NBNSSpoofSpotter, ICMP, FTP, SMTP, SWIFT Lite2. Does not contain (Windows 7.

IP address capacity

The current FortiDeceptor IP address capacity are:
  • A single FDC 1KG can host up to 20 deception VMs.
  • A single FDC VMs can host up to 20 deception VMs.
  • A single deception VM supports up to 24 IP addresses or decoys. Each IP represents a decoy.
  • A single FortiDeceptor appliance (HW/VM) can support up to 480 IP addresses.
  • A single FortiDeceptor appliance (HW/VM) can support up to 128 segments (VLANS).
Tooltip

VPN only supports 8 IPs.

Cisco Decoy only supports 1VLAN.

Decoy services details

Service

Description

BACNET

Enable this service to capture attacks through BACNET on the default BACNET port.

CDP

Enable this service to allow the decoy VM to send CDP traffic within the network.

CoAP
  • Enable this to service capture attacks through CoAP on the default CoAP port.
  • Download libcoap from GitHub is required. Go to https://github.com/miri64/libcoap and follow the command libcoap command rule.

CWMP

Enable this service to send data using CWMP protocol to {ip}:{port}/cpe.

DICOM Server service

  • Server port can be adjusted

  • Server name can be adjusted

  • DICOM operations (e.g. C-STORE, C-FIND) are supported

DNP3

Enable this service to capture attacks through DNP3 on the default DNP3 port.

Elastic Search

  • ES port can be adjusted, and the user-defined port will be used for HTTP REST API calls to interact with the Elasticsearch cluster.
  • ES node name is to define a unique identifier for the default created node with in the Cluster. Decoy hostname will be used if empty.
  • ES cluster name is required to setup the decoy.

ENIP service

  • Enable this service to capture attack through ENIP on the default ENIP port.

  • ENIP serial number is user-defined.

ERP-WEB service

  • Login-required web GUI simulates ERP website

  • Port can be adjusted

FTP service

  • Enable this service to capture attacks through FTP on the default FTP port.

  • FTP port can be adjusted.

  • FTP banner is user-defined.

  • Enable Anonymous Access to allow files access through FTP without needing specific user credentials

GIT

  • HTTP port can be adjusted.
  • HTTPS port can be adjusted.
  • GIT Users are user-defined.
  • Git Repository Import is optional.

Guardian-AST service

  • Enable this service to simulate an AST’s satellite communications remote asset tracking system named Guardian.

  • To deploy a Guardian-AST decoy, this service must be enabled since it is the only service available

GTP-U

  • Enable the service to capture attacks through GTP-U.

HTTP service

  • Enable this service to capture attacks through HTTP on the default HTTP port.

  • Serial Number is user-defined.

HTTPS

  • Enable this service to capture attacks through HTTPS on the default HTTPS port.

ICMP

  • Enable this service to capture ping/attacks through ICMP.
IEC104 service Enable this to service capture attacks through IEC104 on the default IEC104 port.

Infusion Pump (FTP)

  • Simulates Infusion Pump (FTP)

  • A username/password is required to login.

Infusion Pump (Telnet) service

  • Simulates Infusion Pump (telnet)

  • A username/password is required to login.

Infusion Pump (Telnet) service

  • Simulates Infusion Pump (telnet)

  • A username/password is required to login.

IP Camera-WEB

  • A login-required service that displays videos to simulate IP cameras. Default videos are available. However, we strongly recommend uploading 1-8 .mp4 videos that fit best with the working environment.

IPMI service

  • Enable this service to capture attack through IPMI on the default IPMI port.

Jetdirect

  • Enable this service to open port 9100 on the decoy VM, and respond to PJL (Printer Job Language) requests.

KAMSTRUP service

  • Toggle to enable/disable this service. Enable this service to simulate a Kamstrup device

  • To deploy a KAMSTRUP decoy, this service must be enabled since it is the only service available

Lantronix Discovery Protocol service

  • This protocol allows the discovery of Lantronix devices using the Lantronix discovery protocol.

MariaDB

  • Enable this service to open the user defined port on the decoy VM and respond to MySQL database requests within the network.
  • Database name must match the name of database in the uploaded SQL schema.
  • Database content requires a SQL schema file for organizing database objects, providing a structured way to manage data and the relationships between different objects within the database system.

MODBUS

Enable this service to capture attacks through MODBUS on the default MODBUS port.

MOXA
MQTT WEB
  • Enable this service to capture attacks through MQTT WEB on the default MQTT WEB port.
  • Supports custom listening port. Default port is 18083.
  • Supports adding User/Password.

NBNSSpoofSpotter

  • Enable this service to capture attacks through NBNS (NetBIOS Name Service)
  • NBNS Username is user-defined.
  • NBNS Password is user-defined.
  • NBNS Domain is user-defined. (Not mandatory)
  • NBNS Hostname is user-defined.
  • Enable NBNS User Hostname: This allows the system to directly query the specified NBNS hostname.

  • Disable NBNS User Hostname: The system will generate fake hostnames based on the provided string.

  • NBNS Interval setting ranges from 60 to 3600, to manage the frequency of NBNS activities.
NextEPC WEB Enable this service to capture attacks through NextEPC WEB on the default port. Supports adding User/Password.

PACS service

  • A user-defined name for the PACS system.

PACS-WEB service

  • Login-required web GUI for PACS, with existing medical data

  • Port can be adjusted

POS-WEB service

  • Login-required web GUI simulate POS website

  • Port can be adjusted

Printer-WEB

A web GUI that simulates the administration GUI of Lexmark MX410de printer.

PROFINET service Enable this service to capture attacks through PROFINET

RADIUS

centosv1 Decoy
  • Enable this service to capture attacks through RADIUS.
  • Authentication port can be adjusted.
  • Accouting port can be adjusted.
  • FTP banner is user-defined.
  • Enable Anonymous Access to allow files access through FTP without needing specific user credentials
Linux Decoy (Ubuntu16v2)
  • Enable this service to capture attacks through RADIUS.
  • Authentication port can be adjusted.
  • Accounting port can be adjusted.
  • Secret Password is user-defined.

RDP

  • Enable this service to capture attacks through RDP on the default RDP port.

Customized Windows Decoys:

  • Enable this service to capture attacks through RDP on the default RDP port.
  • Automatically enable Allow domain user to access RDP to allow Active Directory (AD) user in RDP service,if the customized windows decoys have joined Active Directory (AD) domain during customization, and input AD user when deploy decoy.
  • Automatically enable Anti Deception Detection feature to allow AD lure users to dynamically login to AD Domain Server daily, if the customized windows decoys have joined Active Directory (AD) domain during customization, and input AD user when deploy decoy.

Router Running-Config (optional)

Allows you to upload a customized Cisco config file to predefine the Cisco router setting

RTSP service

  • When this service is enabled, you will also need to upload a video to a predefined location so the attacker can watch the video.

  • The RTSP port can be adjusted.

  • To upload the video, you can use ffmpeg, or any other method to infinitely loop a video so it is available to the attacker

Example:

To infinitely loop a video:sudo ffmpeg -re -stream_loop -1 -i {path_to_local_video} -c copy -f rtsp rtsp://{ip}:{port}/{name_you_choose};

From the attacker perspective, the live camera stream is available at rtsp://{ip}:{port}/{name_you_choose}

S7COMM service

  • Enable this service to capture attacks through S7COMM on the default S7COMM port.

  • Module Type is user-defined.

  • PLC Name is user-defined.

SAMBA

Enable this service to capture attacks through SMB on the default SMB port.

SAP DISPATCHER

  • Enable SAP DISPATCHER so SAP Logon can get responses from the SAP decoy.
  • Use the default port to ensure SAP Logon can connect.

SAP ROUTER

  • Enable SAP ROUTER Service so SAP Logon can configure the SAProuter String.
  • Use the default port to ensure SAP Logon can connect.

SAP WEB

A fake SAP HTTP and HTTPS GUI for SAP Fiori Launchpad or Legacy WebGUI.

SIP
  • Enable this service to capture attacks through MQTT WEB on the default SIP port.
  • Supports adding User/Password.
  • Users can connect to the SIP server from SIP client service (like Linphone) through UDP or TCP, and register an account, text message, voice call, and video call each other.

SMB

  • Enable this service to capture attacks through SMB on the default SMB port.

Customized Windows Decoys:

  • Enable this service to capture attacks through RDP on the default RDP port.
  • Automatically enable Allow domain user to access RDP to allow Active Directory (AD) user in RDP service,if the customized windows decoys have joined Active Directory (AD) domain during customization, and input AD user when deploy decoy.
  • Automatically enable Anti Deception Detection feature to allow AD lure users to dynamically login to AD Domain Server daily, if the customized windows decoys have joined Active Directory (AD) domain during customization, and input AD user when deploy decoy.

SMTP

  • Enable this service to capture attacks through SMTP (Simple Mail Transfer Protocol).
  • Listening port can be adjusted.
  • SMTP Domain is user-defined.
  • SMTP Banner is user-defined.
  • Enable Secure SMTP to activate TLS (Transport Layer Security) protocol on SMTP service.
  • Secure SMTP listening port can be adjusted.

  • Enable Anonymous Relay to allow anyone to send email to the decoy without requiring authentication.

SNMP

  • Enable this service to open port 161 on the decoy VM, and respond to SNMP (v1 or v2c) request from within the network.
  • Community name is user-defined.
  • SNMP response is customized for:
    • Brother MFC Printer decoy
    • Cisco router decoy
    • GE PLC decoy
    • HP printer decoy
    • HP switch decoy
    • IP camera decoy
    • IPMI Device decoy
    • IPMI Device decoy
    • Lexmark Printer decoy
    • Liebert Spruce UPS decoy
    • moxa nport 5110 decoy
    • Phoenix contact AXC 1050 decoy
    • PowerLogic ION7650 decoy
    • Rockwell 1769-L35E Ethernet Port decoy
    • Schneider Power Meter - PM5560 decoy
    • Schneider SCADAPack 333E decoy
    • Siemens Rockwell PLC decoy
    • Siemens S7-200 PLC decoy
    • Siemens S7-300 PLC decoy
    • Siemens S7-1500 PLC decoy
    • TrueNAS Decoy
    • VAV-DD BACNET controller decoy

SSH

  • Enable this service to open port 22 on the decoy VM and respond to SSH (Secure Shell) requests within the network.
  • SSH banner is user-defined.

SSLVPN

  • Enable this service to capture attacks through SSLVPN on the user-defined port.
SWIFT Lite2
  • Enable this service to activate SWIFT Lite2 on Windows 10 decoy.
  • MT file import is mandatory.

TCPListener

  • Enable this service to capture the port scan attacks on the customized port.
  • TCP banner is user-defined.
Telnet service
MikroTik Router Decoy

A login-required service that enables attackers to utilize all MikroTik router functions.

MikroTik Router Decoy

A login-required service that enables attackers to utilize all MikroTik router functions.

MOXA NPORT 5110 decoy
  • Login-required telnet service simulates moxa nport 5110 command line environment.
  • Two command choices: 1 and 2
Schneider SCADAPack 333E decoy

Login-required telnet service simulates SCADAPack E Smart RTU command line environment.

TFTP Enable this to service capture attacks through TFTP on the default TFTP port

TP-LINK WEB

Enable this service to allow attackers to login to a fake TP-link setting site.

TRICONEX service

  • Enable this service to capture attacks with the TRICONEX service.

UPnP service

  • Enable this service to open port 8080 on the decoy VM and simulate UPnP service.
  • A UPnP msg will broadcast within the network. Within the msg there is a URL for the attacker to download a .xml file showing device information.

VNC

  • Enable this service to capture remote control/support attacks through VNC (Virtual Network Computing) system.
XMPP WEB
  • Enable this service to capture attacks through XMPP WEB on the default XMPP WEB port.
  • Supports custom listening port (default port is 5280).
  • Supports adding User/Password.
  • Can be reached through HTTP.