Jump to content

Home Network Administration Protocol

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Bender the Bot (talk | contribs) at 20:31, 14 June 2017 (top: HTTP→HTTPS for Ars Technica, per BRFA 8 using AWB). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Home Network Administration Protocol (HNAP) is a proprietary network protocol invented[1] by Pure Networks, Inc. and acquired by Cisco Systems which allows identification, configuration, and management of network devices. HNAP is based on SOAP.[2]

Starting in January 2010, vulnerabilities were discovered in multiple D-Link network devices where HNAP authentication could be bypassed.[3][4][5]

2014 HNAP is used by "The Moon" worm which infects Linksys routers.[6]

References

  1. ^ Hopmann, Alex (Jul 14, 2006). "Patent US7827252". Retrieved April 14, 2015.
  2. ^ "HNAP white paper" (PDF). Cisco Systems. Jan 1, 2009.
  3. ^ "Which Routers Are Vulnerable to the D-Link HNAP Exploit?". January 18, 2010. Archived from the original on December 26, 2013. {{cite web}}: Unknown parameter |dead-url= ignored (|url-status= suggested) (help)
  4. ^ ?, Craig (May 15, 2014). "Hacking the D-Link DSP-W215 Smart Plug". Retrieved April 14, 2015. {{cite web}}: |last= has numeric name (help)
  5. ^ ?, Craig (April 10, 2015). "Hacking the D-Link DIR-890L". Retrieved April 14, 2015. {{cite web}}: |last= has numeric name (help)
  6. ^ Bizarre attack infects Linksys routers with self-replicating malware