Home Network Administration Protocol
Appearance
Home Network Administration Protocol (HNAP) is a proprietary network protocol invented[1] by Pure Networks, Inc. and acquired by Cisco Systems which allows identification, configuration, and management of network devices. HNAP is based on SOAP.[2]
Starting in January 2010, vulnerabilities were discovered in multiple D-Link network devices where HNAP authentication could be bypassed.[3][4][5]
2014 HNAP is used by "The Moon" worm which infects Linksys routers.[6]
References
- ^ Hopmann, Alex (Jul 14, 2006). "Patent US7827252". Retrieved April 14, 2015.
- ^ "HNAP white paper" (PDF). Cisco Systems. Jan 1, 2009.
- ^ "Which Routers Are Vulnerable to the D-Link HNAP Exploit?". January 18, 2010. Archived from the original on December 26, 2013.
{{cite web}}
: Unknown parameter|dead-url=
ignored (|url-status=
suggested) (help) - ^ ?, Craig (May 15, 2014). "Hacking the D-Link DSP-W215 Smart Plug". Retrieved April 14, 2015.
{{cite web}}
:|last=
has numeric name (help) - ^ ?, Craig (April 10, 2015). "Hacking the D-Link DIR-890L". Retrieved April 14, 2015.
{{cite web}}
:|last=
has numeric name (help) - ^ Bizarre attack infects Linksys routers with self-replicating malware