Home Network Administration Protocol

From Wikipedia, the free encyclopedia

Home Network Administration Protocol (HNAP) is a proprietary network protocol invented[1] by Pure Networks, Inc. and acquired by Cisco Systems which allows identification, configuration, and management of network devices. HNAP is based on SOAP.[2]

Starting in January 2010, vulnerabilities were discovered in multiple D-Link network devices where HNAP authentication could be bypassed.[3][4][5]

2014 HNAP is used by "The Moon" worm which infects Linksys routers.[6]

References[]

  1. ^ Hopmann, Alex (Jul 14, 2006). "Patent US7827252". Retrieved April 14, 2015.
  2. ^ "HNAP white paper" (PDF). Cisco Systems. Jan 1, 2009.
  3. ^ "Which Routers Are Vulnerable to the D-Link HNAP Exploit?". January 18, 2010. Archived from the original on December 26, 2013.
  4. ^ ?, Craig (May 15, 2014). "Hacking the D-Link DSP-W215 Smart Plug". Retrieved April 14, 2015.CS1 maint: numeric names: authors list (link)
  5. ^ ?, Craig (April 10, 2015). "Hacking the D-Link DIR-890L". Retrieved April 14, 2015.CS1 maint: numeric names: authors list (link)
  6. ^ Bizarre attack infects Linksys routers with self-replicating malware

External links[]

Retrieved from ""