Home Network Administration Protocol
This article relies too much on references to primary sources. (February 2014) |
Home Network Administration Protocol (HNAP) is a proprietary network protocol invented[1] by Pure Networks, Inc. and acquired by Cisco Systems which allows identification, configuration, and management of network devices. HNAP is based on SOAP.[2]
Starting in January 2010, vulnerabilities were discovered in multiple D-Link network devices where HNAP authentication could be bypassed.[3][4][5]
2014 HNAP is used by "The Moon" worm which infects Linksys routers.[6]
References[]
- ^ Hopmann, Alex (Jul 14, 2006). "Patent US7827252". Retrieved April 14, 2015.
- ^ "HNAP white paper" (PDF). Cisco Systems. Jan 1, 2009.
- ^ "Which Routers Are Vulnerable to the D-Link HNAP Exploit?". January 18, 2010. Archived from the original on December 26, 2013.
- ^ ?, Craig (May 15, 2014). "Hacking the D-Link DSP-W215 Smart Plug". Retrieved April 14, 2015.CS1 maint: numeric names: authors list (link)
- ^ ?, Craig (April 10, 2015). "Hacking the D-Link DIR-890L". Retrieved April 14, 2015.CS1 maint: numeric names: authors list (link)
- ^ Bizarre attack infects Linksys routers with self-replicating malware
External links[]
Categories:
- Cisco protocols