Home Network Administration Protocol
Home Network Administration Protocol (HNAP) is a proprietary network protocol invented[1] by Pure Networks, Inc. and acquired by Cisco Systems which allows identification, configuration, and management of network devices. HNAP is based on SOAP.[2]
Starting in January 2010, vulnerabilities were discovered in multiple D-Link network devices where HNAP authentication could be bypassed.[3][4][5]
2014 HNAP is used by "The Moon" worm which infects Linksys routers.[6]
References
- ↑ Hopmann, Alex (Jul 14, 2006). "Patent US7827252". Retrieved April 14, 2015.
- ↑ "HNAP white paper" (PDF). Cisco Systems. Jan 1, 2009.
- ↑ "Which Routers Are Vulnerable to the D-Link HNAP Exploit?". January 18, 2010. Archived from the original on December 26, 2013.
- ↑ ?, Craig (May 15, 2014). "Hacking the D-Link DSP-W215 Smart Plug". Retrieved April 14, 2015.
- ↑ ?, Craig (April 10, 2015). "Hacking the D-Link DIR-890L". Retrieved April 14, 2015.
- ↑ Bizarre attack infects Linksys routers with self-replicating malware
External links
- HNAP Homepage (abandoned April 7, 2011)
- SANS: More on HNAP - What is it, How to Use it, How to Find it
This article is issued from Wikipedia - version of the Sunday, October 25, 2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.