Home Network Administration Protocol
From HandWiki
Revision as of 20:54, 1 August 2022 by imported>WikiG (fix)
Short description: Proprietary network protocol
Home Network Administration Protocol (HNAP) is a proprietary network protocol invented[1] by Pure Networks, Inc. and acquired by Cisco Systems which allows identification, configuration, and management of network devices. HNAP is based on SOAP.[2]
Starting in January 2010, vulnerabilities were discovered in multiple D-Link network devices where HNAP authentication could be bypassed.[3][4][5]
2014 HNAP is used by "The Moon" worm which infects Linksys routers.[6]
References
- ↑ Hopmann, Alex (Jul 14, 2006). "Patent US7827252". http://www.google.com/patents/US7827252. Retrieved April 14, 2015.
- ↑ "HNAP white paper". Cisco Systems. Jan 1, 2009. http://www.cisco.com/web/partners/downloads/guest/hnap_protocol_whitepaper.pdf.
- ↑ "Which Routers Are Vulnerable to the D-Link HNAP Exploit?". January 18, 2010. http://www.sourcesec.com/2010/01/.
- ↑ Craig (May 15, 2014). "Hacking the D-Link DSP-W215 Smart Plug". http://www.devttys0.com/2014/05/hacking-the-d-link-dsp-w215-smart-plug/. Retrieved April 14, 2015.
- ↑ Craig (April 10, 2015). "Hacking the D-Link DIR-890L". http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/. Retrieved April 14, 2015.
- ↑ Bizarre attack infects Linksys routers with self-replicating malware
External links
- HNAP Homepage (abandoned April 7, 2011)
- SANS: More on HNAP - What is it, How to Use it, How to Find it
Original source: https://en.wikipedia.org/wiki/Home Network Administration Protocol.
Read more |