Configure a computing system to serve as an attack target or experimental environment.
A decoy system is a computing resource presented to the adversary in support of active defense. The underlying system can be real, virtual, or simulated, and can be presented as one of a variety of IT devices including user workstations, servers, networking systems, IOT (embedded devices), mobile systems like phones, etc.
|There is an opportunity to study the adversary and collect first-hand observations about them and their tools.
|There is an opportunity to deploy a tripwire that triggers an alert when an adversary touches a network resource or uses a specific technique.
|There is an opportunity to determine if an adversary already has valid account credentials for your network and if they are trying to use them access your network via remote services.
|There is an opportunity to deploy virtual decoy systems and see if an adversary discovers or reacts to the virtualization.
|In an adversary engagement scenario, there is an opportunity to introduce decoy systems that can influence an adversary's behavior or allow you to observe how they perform a specific task.
|There is an opportunity to introduce decoy information, users, systems, etc. to influence an adversary's future actions.
|A defender can use a decoy system to access a compromised website to see how it works (study the exploit sequence, collect relevant artifacts, etc.).
|A defender can use decoy system running a public-facing application to see if an adversary attempts to compromise the system and learn their TTPs.
|A defender can setup a decoy VPN server and see if an adversary attempts to use valid account to authenticate to it.
|A defender can configure a decoy system with limited restrictions to see if the adversary creates or alters scheduled tasks to launch their malware.
|A defender can use a decoy system to see if an adversary exploits vulnerable software in order to compromise the system.
|A defender can add decoy systems to the network so an adversary can have a variety of network services available to them. The defender can observe which network services the adversary attempts to use.
|A defender can deploy a decoy software deployment tool within an adversary engagement environment to see how the adversary attempts to use the device during their activity.
|A defender can deploy a decoy system to see if an adversary attempts to shutdown or reboot the device.
|A defender can deploy a virtual decoy system to see if the adversary recognizes the virtualization and reacts.
|A defender could implement a decoy system running a remote service (such as telnet, SSH, and VNC) and see if the adversary attempts to login to the service.
|A defender could implement a decoy system to study how and when an adversary obfuscate files and hides information.
|A defender can install remote access tools on decoy systems across the network to see if the adversary uses these tools for command and control.
|A defender can have decoy systems that are easy to gain access to and have Office installed. The decoy system can be monitored to see if an adversary attempts to inject anything malicious into Office templates.
|A defender can deploy a diverse set of decoy systems to impact an adversary's level of effort during recon activity.
|Use an isolated system to visit a suspected compromised website. Collect any associated scripting code or files dropped onto the system.
|Setup a server which appears to be something that is commonly expected within a network, such as web server.
|Obfuscated Files or Information
|Network Service Scanning
|Execution, Persistence, Privilege Escalation
|Software Deployment Tools
|Execution, Lateral Movement
|External Remote Services
|Persistence, Initial Access
|Exploit Public-Facing Application
|Exploitation for Client Execution
|Remote Access Software
|Command and Control
|Defense Evasion, Discovery
|Cloud Infrastructure Discovery
|Gather Victim Host Information
|Modify System Image